Env credential access
- Finding
- Environment variable access combined with network send.
Security checks across static analysis, malware telemetry, and agentic risk
The included code is a small CapCut Mate API wrapper, but using it requires trusting the separately installed CapCut Mate service and any configured API endpoint.
Before installing, review and trust the CapCut Mate server you run, keep CAPCUT_MATE_URL pointed at a trusted endpoint, and remember that video draft/render actions can modify projects and may leave a local background service running if Docker detached mode is used.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Installing the skill may require running external code beyond the small wrapper shown here.
The skill depends on a separately cloned and executed server that is not included in the reviewed artifacts or pinned to a specific commit.
git clone https://github.com/Hommy-master/capcut-mate.git ... uv sync ... uv run main.py
Review the CapCut Mate repository or Docker image before running it, prefer pinned versions/commits, and run it with least privilege.
A trusted CapCut Mate server can receive media references and modify or render video drafts.
The wrapper sends draft and video information to a configurable API endpoint and can trigger project changes/rendering; this matches the skill purpose but is still mutating automation.
const BASE_URL = process.env.CAPCUT_MATE_URL || 'http://localhost:30000/openapi/capcut-mate/v1'; ... axios.post(`${BASE_URL}/add_videos`, { draft_url, video_infos });Use only a trusted local or self-controlled CAPCUT_MATE_URL and confirm requested edits before invoking rendering actions.
The CapCut Mate service may continue running after setup until the user stops it.
The documented Docker quick start runs the external service in detached/background mode; this is user-directed and disclosed, not hidden persistence.
docker-compose pull && docker-compose up -d
Stop the Docker service when finished and avoid exposing it beyond localhost unless intentionally secured.