Back to skill
Skillv0.1.4
VirusTotal security
NotebookLM CLI Cookies · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 29, 2026, 3:45 AM
- Hash
- 32b63158c89d142cfe4e17062fa1e7ebf10a876abf48749fbd5da202b2f8710d
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: notebooklm-cli-cookies Version: 0.1.4 The skill is classified as suspicious due to a significant command injection vulnerability identified in `SKILL.md`. The instructions explicitly tell the AI agent to "Always execute exactly: `nlm <args>` via Exec" where `<args>` are derived from user input (e.g., Telegram `/nlm ...`). This allows an attacker to potentially inject arbitrary shell commands, leading to Remote Code Execution (RCE). While the `scripts/aws-inject-notebooklm-auth.sh` and `scripts/bootstrap_vps_systemd_one_liner.sh` handle sensitive authentication data and perform system-level modifications (including systemd persistence), these actions appear to be aligned with the stated purpose of installing and configuring the NotebookLM CLI skill, and do not show clear malicious intent like unauthorized exfiltration or backdoors.
- External report
- View on VirusTotal
