Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Browser Audio Capture

v1.1.0

Capture audio from any browser tab — meetings, YouTube, podcasts, courses, webinars — and stream to any AI agent. Zero API keys, works with any framework.

0· 428·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description match the implementation: Python CDP client + JS injection and a Chrome MV3 extension that capture tab audio and POST base64 PCM chunks. Required artifacts (Chrome with CDP, extension permissions) are consistent with the stated purpose. There are no unrelated env vars, binaries, or weird install steps.
Instruction Scope
SKILL.md and the code instruct the agent/user to start Chrome with remote-debugging or load the provided extension and then capture audio from tabs. The injected JS and extension send audio plus tab metadata (URL/title) to PERCEPT_URL (default 127.0.0.1:8900). This is consistent with the purpose but is high-sensitivity behavior (continuous recording, metadata included). The instructions allow 'watch' mode and auto-detection of meeting tabs, which grants the skill broad discretion to start/stop captures automatically.
Install Mechanism
No install spec is provided (instruction-only). That keeps install risk low: user manually loads the extension and runs Python. The extension is unpacked developer-install and requires user action to add. The only third-party dependency called out is aiohttp (pip), which is proportional.
Credentials
The skill requires no environment variables or external credentials. Browser permissions in the extension (tabCapture, activeTab, offscreen) are appropriate for capturing tab audio, but they are powerful — the extension can keep capturing after the popup closes. The code posts captured audio and tab metadata to a configurable endpoint (PERCEPT_URL); by default this is localhost, but changing it would cause exfiltration of sensitive audio, so endpoint trust is critical.
Persistence & Privilege
always:false (normal). The MV3 offscreen document and service worker let the extension persist captures after the popup closes, and the CLI includes a watch mode for continuous operation. Autonomous model invocation is permitted by default on the platform — combined with the skill's ability to start captures, this means an agent could trigger recording if allowed; this is expected behaviour but raises privacy considerations.
Assessment
This package is internally consistent for capturing browser tab audio, but it records sensitive audio and sends it (by default) to whatever PERCEPT_URL is configured. Before installing or enabling: 1) Inspect and, if necessary, change PERCEPT_URL so it points to a trusted local receiver; 2) Only load the unpacked extension yourself (don’t accept someone else’s already-installed extension); 3) Be aware the extension uses tabCapture/offscreen and can continue recording after the popup closes — stop captures when finished; 4) Use a dedicated Chrome profile when running with --remote-debugging-port; 5) If you plan to let an AI agent invoke this skill autonomously, understand it could start/stop captures — restrict autonomous permissions or review invocation policies. If you want to be extra cautious, run a local network monitor to confirm traffic goes only to approved endpoints. If you need further assurance, provide the skill author/source or a verified homepage before trusting with sensitive meetings.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cs9gakc84hz9hyfmqs4079x81wceg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments