Record screen, microphone or camera from macOS terminal
PassAudited by VirusTotal on May 12, 2026.
Overview
Type: OpenClaw Skill Name: record Version: 0.2.0 This skill bundle is classified as suspicious due to the inherent high-risk capabilities it provides: recording microphone audio, screen video/screenshots, and camera video/photos. While the `SKILL.md` explicitly instructs the AI agent to obtain user consent before performing any recording, the capability itself involves sensitive data capture. Additionally, the installation method via a custom Homebrew tap (`brew install atacan/tap/record`) introduces a supply chain consideration, as the binary is sourced from a third-party repository rather than Homebrew core.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If approved, an agent can create recordings or screenshots that may include private conversations, windows, credentials visible on screen, or the user's surroundings.
The skill exposes high-impact recording actions, but it explicitly requires consent and confirmation of what will be captured and for how long.
**Always ask the user for explicit permission before running any recording command.** Recording audio (microphone), screen, or camera captures sensitive data
Only approve captures you specifically requested, and confirm the source, duration, target window/display, and output location before running.
Granting these permissions lets terminal-launched tools access microphone, screen, or camera until the permission is revoked.
The tool requires sensitive macOS privacy permissions. This matches the recording purpose, but those permissions can remain available to terminal commands beyond a single capture.
The terminal app (Terminal, iTerm2, etc.) must have the relevant permission enabled in System Settings > Privacy & Security: Microphone, Screen Recording, Camera
Grant only the permissions needed for the task, use a trusted terminal session, and revoke permissions after use if they are not needed.
Installing the package means trusting an external binary to handle microphone, screen, and camera capture.
Installation depends on an external Homebrew tap while the reviewed skill contains no executable code or install spec, so the actual CLI implementation is outside the provided artifacts.
brew install atacan/tap/record
Inspect the Homebrew tap and upstream source before installing, prefer trusted or pinned releases, and avoid installing if the provenance cannot be verified.
