Notebooklm

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is aligned with NotebookLM use, but it asks users to trust an unpinned unofficial Google client that logs in, stores credentials locally, and can upload or delete NotebookLM content.

Review this before installing. If you proceed, use an isolated Python environment, pin and inspect the notebooklm-py package, understand where credentials are stored and how to revoke them, use a low-risk Google account if possible, and require confirmation before uploading files or deleting notebooks.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing and using the skill may give the third-party NotebookLM client ongoing access to the user's NotebookLM/Google session.

Why it was flagged

The skill requires a persistent Google login through an unofficial client, but the artifacts do not bound credential scope, storage location, revocation, or account permissions; the supplied registry metadata also declares no primary credential.

Skill content
通过非官方 Python API 访问 Google NotebookLM 的全部功能。 ... notebooklm login ... 首次登录后,凭据会保存在本地,后续无需重复登录
Recommendation

Use a dedicated or low-risk Google account where possible, verify how the package stores and revokes credentials, and avoid running account-changing commands without explicit user confirmation.

What this means

A future or compromised package version could run local code or mishandle Google session data.

Why it was flagged

The helper can install unpinned external packages that are not included in the artifact review. This is more material because the dependency is described as an unofficial Google internal-API client and handles login/session behavior.

Skill content
subprocess.run([sys.executable, "-m", "pip", "install", "notebooklm-py"], check=True)
subprocess.run([sys.executable, "-m", "pip", "install", "notebooklm-py[browser]"], check=True)
Recommendation

Inspect the package before use, pin a reviewed version, install in an isolated virtual environment, and avoid granting it access to sensitive accounts until provenance is verified.

What this means

The user could unintentionally delete a NotebookLM notebook or upload a local document to the service.

Why it was flagged

The documented CLI supports account mutation and local-file upload. These are purpose-aligned NotebookLM operations, but they are high-impact if an agent runs them without clear user approval.

Skill content
notebooklm delete <notebook_id> ... notebooklm source add "./paper.pdf"
Recommendation

Require explicit confirmation before delete, upload, share, or bulk operations, and prefer user-selected file paths.

What this means

Sensitive local documents may be uploaded to and retained in NotebookLM for future use.

Why it was flagged

The skill can add local files as persistent NotebookLM sources used for later generation and Q&A. This is central to the purpose, but users should treat NotebookLM notebooks as stored knowledge bases.

Skill content
添加本地文件(PDF、Word、Markdown、音频、视频、图片)
notebooklm source add "./paper.pdf"
Recommendation

Only upload documents the user intends to store in NotebookLM, and review provider retention and sharing settings before adding sensitive material.