Overleaf

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This appears to be a real Overleaf integration, but it relies on browser-cookie/keychain access and an unpinned external CLI that can modify projects and accept invites, so it needs careful review before use.

Install only if you are comfortable giving pyoverleaf access to browser cookies/keychain data. Prefer a pinned, reviewed pyoverleaf version, use a dedicated browser profile if possible, and require explicit confirmation before uploading, deleting, or accepting any Overleaf invite.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Granting this access could let the external tool act as the logged-in Overleaf user and access browser cookie storage if the tool or dependency is compromised.

Why it was flagged

The skill depends on local browser session material and durable keychain access, which is broader and more sensitive than a scoped Overleaf API token.

Skill content
pyoverleaf needs "Always Allow" keychain access to read browser cookies. This grants the tool access to your browser's cookie storage.
Recommendation

Only grant keychain/cookie access if you trust the exact pyoverleaf version; consider a dedicated browser profile or Overleaf account, and revoke permissions when finished.

What this means

A changed or compromised pyoverleaf release would receive the same browser-cookie/keychain access needed by this skill.

Why it was flagged

The install command does not pin v0.1.7 or any hash, so users may install a different latest package version than the one claimed to have been audited.

Skill content
pyoverleaf (`pipx install pyoverleaf`)... We have audited pyoverleaf v0.1.7 and found it safe.
Recommendation

Pin the dependency to a reviewed version, provide an install spec or lockfile, and avoid relying on an unaudited latest package for cookie-based authentication.

What this means

The agent could add projects to the user's Overleaf account or accept the wrong invite if the user request is ambiguous.

Why it was flagged

The documented invite workflow uses authenticated session requests to accept project invites, and the provided example iterates pending invites rather than requiring explicit confirmation for each one.

Skill content
The agent can accept Overleaf project invitations programmatically using browser cookies — no manual clicking required.
Recommendation

Require the user to specify the exact project URL or invite, show the project name and inviter, and ask for explicit approval before sending the accept request.

NoteHigh Confidence
ASI08: Cascading Failures
What this means

A mistaken project name or file path could change or delete shared LaTeX content.

Why it was flagged

The documented commands can overwrite or remove files in shared Overleaf projects; this is purpose-aligned but can affect collaborators if used on the wrong path.

Skill content
cat local.tex | pyoverleaf write "Project Name/main.tex"... pyoverleaf rm "Project Name/old-draft.tex"
Recommendation

Confirm the target project and file path before writes or removals, and rely on Overleaf history/backups for recovery.