Cameras

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: cameras Version: 1.0.1 The skill bundle is generally benign, providing functionality for camera integration and video processing using standard tools like ffmpeg, gphoto2, and cloud vision APIs. The SKILL.md explicitly promotes user-driven credential handling and warns against logging sensitive data. However, the `security-integration.md` file contains a `curl -k` command for UniFi Protect integration, which disables SSL certificate validation. This creates a Man-in-the-Middle (MITM) vulnerability, allowing potential interception and manipulation of communication with the camera system. This is a significant security flaw, classifying the skill as suspicious due to this vulnerability.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If these commands are run, the agent or user may capture images from a local webcam or connected camera.

Why it was flagged

The docs show raw local tool invocation to capture camera images. This is central to the skill’s purpose and user-directed, but it can access camera hardware and write image files.

Skill content
cmd = [ 'ffmpeg', '-y', '-f', 'avfoundation', ... '-frames:v', '1', ... output ]
subprocess.run(cmd, capture_output=True)
Recommendation

Only run capture commands after confirming the intended device, output path, and user consent.

What this means

Camera URLs, passwords, and tokens could expose private camera feeds if pasted into logs, shell history, or shared conversations.

Why it was flagged

The skill expects users to provide camera access credentials. This is purpose-aligned, but those credentials can grant access to security cameras or home-security systems.

Skill content
User provides camera credentials (RTSP URLs, passwords)
Recommendation

Prefer environment variables or a secure secret store, avoid sharing full camera URLs with embedded passwords, and use least-privileged camera accounts where possible.

What this means

Snapshots from private or security cameras may be transmitted to third-party cloud services for analysis.

Why it was flagged

The processing guide describes sending captured camera images to external vision providers such as Anthropic, Google Cloud Vision, or AWS Rekognition. This is disclosed and purpose-aligned, but it moves private imagery outside the local camera environment.

Skill content
The simplest approach: capture image, send to vision model.
Recommendation

Confirm before sending camera images to cloud services, use local processing when privacy is important, and avoid uploading images containing sensitive people, locations, or documents unless necessary.

What this means

A monitoring setup could continue watching cameras or sending alerts longer than intended.

Why it was flagged

The docs include continuous monitoring and persistent MQTT subscription examples. They are coherent with security monitoring, but can keep operating indefinitely if implemented without explicit bounds.

Skill content
while True:
    frame = capture_snapshot(camera_url)
...
client.loop_forever()
Recommendation

Set clear monitoring windows, stop conditions, notification limits, and storage-retention rules before using continuous monitoring patterns.