Notebooklm Content

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill is coherent for automating Google NotebookLM, but it depends on a browser relay controlling a logged-in Chrome tab, so users should keep that access tightly scoped.

Before installing, make sure you trust the Browser Relay extension, use it only on the intended NotebookLM tab, keep your gateway token private, and avoid uploading sensitive sources unless you are comfortable storing them in Google NotebookLM.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI02: Tool Misuse and Exploitation
Low
What this means

The agent could click or type into the enabled NotebookLM tab and create or modify content under the user's session.

Why it was flagged

These commands let the agent interact with and capture the enabled browser tab. That is expected for NotebookLM automation, but browser actions can affect the live page if used on the wrong tab or element.

Skill content
openclaw browser click <element-ref> --browser-profile chrome-relay --json
openclaw browser type <element-ref> "text content" --browser-profile chrome-relay --json
openclaw browser screenshot --browser-profile chrome-relay
Recommendation

Enable the relay only for the intended NotebookLM tab, keep progress visible, and disable the relay when the task is complete.

#
ASI03: Identity and Privilege Abuse
Medium
What this means

Created notebooks, uploaded sources, and generated outputs may be stored in the user's Google account.

Why it was flagged

The workflow operates through the user's authenticated Google NotebookLM browser session. This is purpose-aligned, but actions happen with the user's account privileges.

Skill content
- User must be logged into NotebookLM in Chrome
Recommendation

Use a dedicated browser profile or account if possible, and review generated notebooks and links before sharing them.

#
ASI07: Insecure Inter-Agent Communication
Medium
What this means

Contents and controls of the enabled tab may be accessible through the relay while it is active.

Why it was flagged

The browser relay creates a local control channel protected by a gateway token. The guide warns not to paste the token, but enabling the relay still exposes the selected tab to OpenClaw control.

Skill content
Gateway token: from ~/.openclaw/openclaw.json -> gateway.auth.token

**IMPORTANT:** Never paste the token in chat!

... Enable relay for that tab
4. Tab is now controllable via OpenClaw
Recommendation

Keep the gateway token private, configure it only in trusted extension settings, and enable relay only for tabs needed for the task.

#
ASI04: Agentic Supply Chain Vulnerabilities
Low
What this means

Installing the wrong or untrusted browser extension could expose browser tabs or gateway access.

Why it was flagged

The skill depends on an external Chrome extension, but the registry artifacts do not include an install spec or source URL for that dependency.

Skill content
1. Install OpenClaw Browser Relay extension in Chrome
Recommendation

Install the Browser Relay only from an official or trusted OpenClaw source and verify the extension before providing the gateway token.