YouTube Upload Videos Skill

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill matches its YouTube-upload purpose, but it persists YouTube upload credentials in a relative token file and loads them with unsafe pickle deserialization.

Install only if you are comfortable granting YouTube upload permission. Confirm each video file and privacy setting, keep token.pickle private, delete or revoke the token when done, and avoid running the script where an untrusted token.pickle might exist.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent can publish or upload videos to the user's YouTube account when invoked.

Why it was flagged

Uploading to YouTube, especially with a public privacy option, is a high-impact account action. It is purpose-aligned, but the user should explicitly verify the selected file and privacy setting.

Skill content
Use this skill when the user asks to upload a video to YouTube. It supports titles, descriptions, privacy settings (public, private, unlisted)
Recommendation

Confirm the exact video file, title, description, and privacy setting before running the upload, especially for public uploads.

What this means

Anyone or any agent process able to use the stored token may be able to upload to the authorized YouTube account.

Why it was flagged

The skill persists delegated YouTube upload authority after OAuth. This is expected for the integration, but it means later uploads may not prompt the user to re-authenticate.

Skill content
Once approved, a `token.pickle` file is generated locally, and subsequent uploads will run silently.
Recommendation

Use a dedicated Google account if possible, keep the token file private, delete token.pickle or revoke OAuth access when finished, and review uploads before allowing the agent to run the script.

What this means

Running the skill from an untrusted directory or with a malicious token.pickle present could execute unexpected local code.

Why it was flagged

Python pickle can execute code while deserializing. Because the token file is a relative path in the working directory, a tampered or attacker-supplied token.pickle could be loaded when the upload script runs.

Skill content
token_file = 'token.pickle' ... creds = pickle.load(token)
Recommendation

Avoid running this skill in untrusted folders, remove unexpected token.pickle files before use, and update the implementation to store credentials in a safer format or a fixed private path rather than loading pickle from the current directory.

What this means

Users may install different dependency versions over time, with security and compatibility depending on PyPI resolution at install time.

Why it was flagged

The documented dependency installation uses unpinned package names. This is expected for a Python API integration, but it leaves exact versions and provenance to the user's environment.

Skill content
pip3 install google-api-python-client google-auth-oauthlib google-auth-httplib2
Recommendation

Install dependencies in a virtual environment from trusted package sources and prefer pinned versions or a reviewed requirements file.