FadNote

PassAudited by ClawScan on May 10, 2026.

Overview

FadNote does what it claims: it locally encrypts user-provided text, uploads the encrypted note to a configured FadNote server, and returns a one-time share link.

This skill appears safe for its stated purpose, but only use it with a FadNote server you trust and share the generated URL carefully because the link contains the decryption key.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The server receives encrypted note data and metadata, and anyone who gets the final URL including the fragment key can read the note once.

Why it was flagged

The skill uploads the locally encrypted note blob to a configured external FadNote endpoint. This is purpose-aligned and the code keeps the decryption key out of the POST body, but sensitive user content still depends on correct endpoint and link handling.

Skill content
const FADNOTE_URL = process.env.FADNOTE_URL || 'https://fadnote.com'; ... await fetch(`${FADNOTE_URL}/n`, { method: 'POST', ... body: blob });
Recommendation

Use a trusted FADNOTE_URL, verify the recipient before sharing the generated link, and treat the full URL as sensitive.

What this means

A secret could be exposed locally if it is placed directly in a command line, copied from the clipboard, or included in a file without review.

Why it was flagged

The documentation shows passing secrets, files, and clipboard contents into the CLI. That is expected for this tool, but users should notice that local command invocations, agent transcripts, shell history, or selected files may expose more than intended before encryption/upload.

Skill content
[runs: echo "sk-abc123xyz" | fadnote] ... cat file.txt | fadnote ... pbpaste | fadnote
Recommendation

Prefer safe stdin or agent-managed secret input where possible, and review file or clipboard contents before creating a note.