Stremio Casting

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: stremio-cast Version: 1.0.0 The skill is classified as suspicious due to the use of security-reducing browser flags (`--ignore-certificate-errors`, `--no-sandbox`, `--disable-setuid-sandbox`) in `scripts/stremio_cast.py`, which weaken the security posture of the automated browser. Additionally, it utilizes `subprocess.Popen` to execute external commands (`catt`), a powerful primitive that, while used for its stated purpose here, carries inherent risk in an agent environment. There is no clear evidence of intentional malicious behavior such as data exfiltration, persistence, or prompt injection for harmful objectives.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user may believe the skill only uses their local Stremio service when it is actually configured to use a specific hard-coded server address.

Why it was flagged

The documentation tells users the stream comes from a local Stremio service, but the included script hard-codes a different stremio.rocks streaming server using a specific 192.168.15.162 address and port 12470.

Skill content
Intercepta a URL do stream gerada pelo servidor local do Stremio (`127.0.0.1:11470`).
Recommendation

Update the skill to discover or require the user's own Stremio server URL, and make the actual network target clear before casting.

What this means

The agent could cast an unintended or unverified stream to a local device, and browser traffic is made less protected by the disabled sandbox/certificate checks.

Why it was flagged

The script uses a hard-coded streaming server, launches a browser with reduced safety checks, and then sends the captured stream URL to CATT to control a Chromecast.

Skill content
streamingServer=https%3A%2F%2F192-168-15-162.519b6502d940.stremio.rocks%3A12470 ... args=['--no-sandbox', '--disable-setuid-sandbox', '--ignore-certificate-errors'] ... subprocess.Popen(['catt', '-d', device, 'cast', stream_url])
Recommendation

Require user confirmation of the selected title, stream source, and Chromecast device; avoid disabling browser protections unless strictly necessary; and remove the hard-coded server.

What this means

Users may need to install required tools manually, which can introduce version or provenance risk.

Why it was flagged

The metadata does not declare or pin the required runtime tools even though SKILL.md and the script depend on Playwright and CATT.

Skill content
No install spec — this is an instruction-only skill. Required binaries (all must exist): none.
Recommendation

Install Playwright and CATT only from trusted sources, and prefer a future version that declares and pins its dependencies.

NoteMedium Confidence
ASI10: Rogue Agents
What this means

Playback on the Chromecast may continue after the agent reports success or stops running.

Why it was flagged

CATT is started without being awaited or explicitly stopped, so the cast action may outlive the main script flow.

Skill content
subprocess.Popen(['catt', '-d', device, 'cast', stream_url]) ... await asyncio.sleep(10)
Recommendation

Make sure users know how to stop the cast, and consider adding a cleanup or stop command.