Back to skill
v1.0.0

Compressor Youtube

BenignClawScan verdict for this skill. Analyzed Apr 30, 2026, 11:02 PM.

Analysis

This skill appears purpose-aligned for cloud video compression, but users should know it uploads videos to a NemoVideo backend and uses a Nemo token/session.

GuidanceThis skill is reasonable to use if you are comfortable uploading your video files to the NemoVideo cloud service and using a NEMO_TOKEN for processing. Avoid sending confidential videos unless you trust the provider, keep your token private, and review the compressed output before posting.

Findings (8)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

Abnormal behavior control

Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.

Agent Goal Hijack
SeverityLowConfidenceHighStatusNote
SKILL.md
Backend says | "click [button]" / "点击" | Execute via API

The skill treats certain backend text responses as triggers for follow-up API actions. This is a limited control handoff to the integrated backend, but it is described as part of the intended video workflow.

User impactBackend responses may cause the agent to take additional workflow steps without restating every action to the user.
RecommendationUse the skill for intended video tasks and ask for confirmation before any unexpected upload, edit, or export action.
Tool Misuse and Exploitation
SeverityLowConfidenceHighStatusNote
SKILL.md
Upload: POST `/api/upload-video/nemo_agent/me/<sid>` — file: multipart `-F "files=@/path"` ... Export ... POST `/api/render/proxy/lambda`

The skill can upload user-provided files or URLs and start server-side render/export jobs. These are normal tools for a video compression skill, but they are high-impact enough for users to notice.

User impactVideos or URLs provided to the skill can be sent to the remote service and processed into downloadable outputs.
RecommendationOnly provide media you intend to upload for processing, and verify the requested action before exporting or sharing output links.
Agentic Supply Chain Vulnerabilities
SeverityInfoConfidenceMediumStatusNote
metadata
Source: unknown; Homepage: none

The skill has limited public provenance metadata. There is no local install script or code in the provided artifacts, so this is a provenance note rather than evidence of unsafe installation behavior.

User impactUsers have less information for independently verifying the publisher or service provenance.
RecommendationReview the service domain and publisher before trusting it with important or private videos.
Cascading Failures
SeverityLowConfidenceHighStatusNote
SKILL.md
The session token carries render job IDs, so closing the tab before completion orphans the job.

A render job can continue or become untracked after the local session is interrupted. This is disclosed and contained to the remote render workflow.

User impactA started render may become difficult to monitor or recover if the session is closed mid-job.
RecommendationKeep the session open until completion when possible, and record output or job information if the service exposes it.
Human-Agent Trust Exploitation
SeverityInfoConfidenceMediumStatusNote
SKILL.md
Upload your large video files ... up to 500MB ... A quick example: upload a 1.2GB YouTube vlog

The instructions contain a size-limit inconsistency and marketing-style claims such as compression without losing quality. This is not evidence of malicious behavior, but users should verify actual limits and output quality.

User impactUsers may expect larger file support or higher quality preservation than the service reliably provides.
RecommendationCheck file-size limits and review compressed output before relying on it for publishing.
Permission boundary

Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.

Identity and Privilege Abuse
SeverityLowConfidenceHighStatusNote
SKILL.md
Check if `NEMO_TOKEN` is set... POST to `https://mega-api-prod.nemovideo.ai/api/auth/anonymous-token`... `Authorization: Bearer <token>`

The skill uses a bearer token, either from the environment or an anonymous-token endpoint, to authenticate to the NemoVideo API. This is expected for the disclosed cloud service and no artifact shows token logging or unrelated use.

User impactThe token may grant access to the user's NemoVideo session, credits, and render jobs.
RecommendationKeep NEMO_TOKEN private, avoid sharing logs that contain it, and rotate or remove it if you no longer use the service.
Sensitive data protection

Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.

Memory and Context Poisoning
SeverityLowConfidenceHighStatusNote
SKILL.md
Store the returned `session_id` for all subsequent requests.

The skill maintains a session identifier and later queries session state containing draft and media information. This is expected for a multi-step render workflow, but it means remote context persists across requests.

User impactSession state may retain information about uploaded videos, drafts, generated media, and render jobs.
RecommendationAvoid uploading sensitive media unless you trust the remote service, and clear sessions or tokens when finished if the platform provides that option.
Insecure Inter-Agent Communication
SeverityMediumConfidenceHighStatusNote
SKILL.md
The AI video compression runs on remote GPU nodes — nothing to install on your machine... Upload: POST `/api/upload-video/nemo_agent/me/<sid>`

The skill sends user media to an external backend named nemo_agent for processing. The endpoint and bearer-token authorization are disclosed, making this purpose-aligned, but it is still a data boundary users should understand.

User impactUploaded videos leave the local environment and are processed by the remote provider.
RecommendationDo not upload private, regulated, or confidential videos unless you are comfortable with the provider's handling of that data.