Paperzilla CLI

PassAudited by ClawScan on May 1, 2026.

Overview

The skill is a coherent Paperzilla CLI helper, with expected but noteworthy trust in an external CLI install and Paperzilla account/feed-token authentication.

This appears safe for its stated purpose if you trust Paperzilla and intentionally want its CLI. Before installing, be aware that the Linux install downloads an external binary into your system path, `pz login` gives the CLI access to your Paperzilla account, and Atom feed URLs contain embedded tokens that should not be shared publicly.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing this may add an externally supplied executable to your system path.

Why it was flagged

The Linux install downloads the latest external binary without a pinned version or checksum and places it into a privileged PATH location. This is a common CLI install pattern, but it requires trusting the upstream release.

Skill content
curl -sL https://github.com/paperzilla-ai/pz/releases/latest/download/pz_linux_amd64.tar.gz | tar xz
sudo mv pz /usr/local/bin/
Recommendation

Install only if you trust Paperzilla’s distribution channel; prefer package-manager installs where available and verify releases/checksums if provided.

What this means

The CLI may access Paperzilla projects and feeds tied to your account.

Why it was flagged

The skill requires authenticating to a Paperzilla account, which is expected for browsing account-specific projects and feeds but still grants the CLI delegated account access.

Skill content
Log in with your Paperzilla account before doing anything else:
```bash
pz login
```
Recommendation

Use the intended Paperzilla account, review the CLI’s authentication flow, and revoke access if you no longer use the tool.

What this means

Sharing or pasting the Atom URL could disclose access to your Paperzilla feed.

Why it was flagged

The Atom integration can expose a token-bearing URL. That is purpose-aligned for RSS/Atom readers, but the URL should be treated like a secret because anyone with it may be able to access the feed.

Skill content
This prints a URL with an embedded feed token.
Recommendation

Only put the tokenized feed URL into trusted feed readers and revoke/regenerate it if it is exposed.