Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Nlm Cli
v0.1.1使用 Jacob Brown 的 `notebooklm-mcp-cli`(`nlm` 命令)自动化操作 NotebookLM。适用于处理 Notebook、来源(sources)、Studio 内容生成、Research、分享、MCP 配置,以及音频、视频、报告、幻灯片、信息图、数据表、测验、抽认卡等产物下载。...
⭐ 1· 268·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name/description claim to automate NotebookLM via Jacob Brown's notebooklm-mcp-cli and the included files (references + wrapper script) directly implement that. Nothing in the package requests unrelated services or secrets. Minor mismatch: registry metadata lists no required binaries/env vars but the SKILL.md and script clearly require node and an nlm executable (or NLM_BIN).
Instruction Scope
SKILL.md confines runtime behavior to running the nlm CLI via the provided wrapper, reading its shippped reference docs, and guiding login/installation steps. It does not instruct reading arbitrary host files or sending data to unknown remote endpoints. It does rely on the user having authenticated NotebookLM access (Google account) via nlm login, which is expected for the stated functionality.
Install Mechanism
There is no install specification (instruction-only) and the only executable code is a small wrapper script. No downloads or archive extraction are performed by the skill itself, so installation risk is low. The references suggest installing notebooklm-mcp-cli via a tool or pip — you should verify the upstream source before installing.
Credentials
The skill does not declare required env vars in metadata, but the wrapper honors NLM_BIN and manipulates PATH to prefer {baseDir}/.venvs/nlm-mcp/bin. The skill will act using whatever nlm binary is discovered (env var, local venv, or PATH). It does not request unrelated credentials, but it will operate with the user's NotebookLM/Google auth once nlm is logged in.
Persistence & Privilege
always is false and the skill does not attempt to persist itself, modify other skills, or change global agent settings. It only provides a wrapper and docs and runs the external nlm process when invoked.
Assessment
This skill is essentially a documented wrapper around the external notebooklm-mcp-cli. Before installing or using it: 1) ensure you have node and inspect/verify the notebooklm-mcp-cli package source (pip/uv) and its maintainers; 2) be aware the wrapper will run whatever 'nlm' it finds (NLM_BIN, a local .venvs path, or your PATH) — avoid setting NLM_BIN to untrusted binaries and ensure .venvs is clean; 3) using the CLI requires logging in to your Google/NotebookLM account, so the CLI will operate with your NotebookLM data — only proceed if you trust the upstream CLI; 4) there is a metadata mismatch (node/nlm not declared) — the wrapper and docs list the true runtime requirements, so make sure your environment satisfies them; 5) if you are uncertain about the upstream 'nlm' distribution, inspect its code or run it in an isolated environment before granting it access to your account.scripts/nlm.mjs:40
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk9711h5t1ctepvjf18xhz1mzxs82wmhe
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
