muapi-media-editing

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill appears to do what it says—send user-selected media to muapi.ai for AI editing—but users should treat uploaded media and the MUAPI_KEY stored in `.env` as sensitive.

This skill is coherent for AI media editing and does not show artifact-backed malicious behavior. Before installing, be comfortable sending selected images, video, audio, face images, and masks to muapi.ai, keep the MUAPI_KEY private, and verify the referenced upload helper if using local file inputs.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Private photos, videos, audio, face images, or masks provided to the script may be sent to muapi.ai for processing.

Why it was flagged

When a user supplies a local file, the script uploads that selected file to the external muapi.ai API. This is purpose-aligned, but it is a sensitive data flow.

Skill content
curl -s -X POST "${MUAPI_BASE}/upload_file" -H "x-api-key: $MUAPI_KEY" -F "file=@${FPATH}"
Recommendation

Only run local-file options on media you are allowed to upload, and review muapi.ai’s privacy and retention terms before using sensitive media.

What this means

If the `.env` file is shared, committed, or readable by others, the muapi.ai API key could be exposed.

Why it was flagged

The script offers an `--add-key` path that saves the muapi.ai API key into a local `.env` file, and later uses MUAPI_KEY for API requests. This is expected for the service but should be handled as a credential.

Skill content
echo "MUAPI_KEY=$KEY_VALUE" >> .env
Recommendation

Use a dedicated muapi.ai key, keep `.env` out of source control, restrict file permissions, and rotate the key if it may have been exposed.

What this means

Using `edit-image.sh --file` may depend on external local code that was not included in this review.

Why it was flagged

The image-editing script calls a helper script outside the provided file manifest for local file uploads, so that helper’s behavior is not reviewable from the supplied artifacts.

Skill content
IMAGE_URL=$(bash "$(dirname "$0")/../media/upload.sh" --file "$IMAGE_FILE")
Recommendation

Verify that `../media/upload.sh` is present and trusted before using the `--file` path, or prefer explicit `--image-url` inputs.

What this means

A malicious or unexpected `.env` in the working directory could run shell commands when the script starts.

Why it was flagged

The script loads configuration by shell-sourcing `.env`; this is likely intended to read MUAPI_KEY, but shell sourcing can execute commands if the `.env` file contains them.

Skill content
if [ -f ".env" ]; then source .env 2>/dev/null || true; fi
Recommendation

Keep `.env` files trusted and local to the skill, and prefer safer key-loading logic that parses MUAPI_KEY without shell-sourcing arbitrary file contents.