YouMind

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill can act as the logged-in Youmind user, and cached session data could allow account access if the local skill data is exposed.

Why it was flagged

This shows the skill uses live browser session cookies and persists them locally. That may be necessary for the Youmind API, but it is sensitive account access and the provided metadata lists no primary credential or required credential configuration.

Skill content
Reads fresh YouMind cookies using `Network.getAllCookies`; Caches them locally in `data/cdp_cache.json` with a **5-hour TTL**; On cache expiry, silently re-fetches from the browser
Recommendation

Install only if you trust the skill with your Youmind session. Prefer a dedicated Youmind account/browser profile, verify cookie handling is limited to youmind.com, and clear the data/ directory when you no longer need the skill.

What this means

An agent using this skill can add or change content in the user’s Youmind account and upload selected local files to Youmind.

Why it was flagged

The skill exposes commands that create account content, upload local files, and trigger generation workflows. These are disclosed and purpose-aligned, but they are still impactful operations.

Skill content
create --name "My Board" ... upload-file --board-id <board-id> --file /path/to/file.pdf ... generate-image ... generate-slides
Recommendation

Give the agent explicit board IDs, file paths, and prompts, and review requests before allowing uploads or generated content operations.

What this means

First use may download and install software into the skill’s local environment.

Why it was flagged

The skill can install dependencies and a browser binary during first-run environment setup. This appears central to its browser-auth flow, but it is not represented as an install spec in the registry metadata.

Skill content
subprocess.run([str(pip_exe), "install", "-q", "-r", str(requirements_file)], check=True) ... subprocess.run([str(python_exe), "-m", "patchright", "install", "chrome"], check=True
Recommendation

Run it in an isolated environment, review requirements.txt, and avoid installing if you do not want the skill to manage a local virtual environment and browser dependency.

What this means

Sensitive document content may appear in the agent transcript, logs, or downstream summaries if raw extraction is used.

Why it was flagged

When requested, artifact extraction can place raw document content from Youmind into the command output and agent context.

Skill content
if include_raw_content:
            result["raw_content"] = ((page.get("content") or {}).get("raw"))
Recommendation

Use `--include-raw-content` only for documents you are comfortable exposing to the local agent session and its logs.