Paperzilla CLI
PassAudited by ClawScan on May 1, 2026.
Overview
The skill is a coherent Paperzilla CLI helper, with expected but noteworthy trust in an external CLI install and Paperzilla account/feed-token authentication.
This appears safe for its stated purpose if you trust Paperzilla and intentionally want its CLI. Before installing, be aware that the Linux install downloads an external binary into your system path, `pz login` gives the CLI access to your Paperzilla account, and Atom feed URLs contain embedded tokens that should not be shared publicly.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Installing this may add an externally supplied executable to your system path.
The Linux install downloads the latest external binary without a pinned version or checksum and places it into a privileged PATH location. This is a common CLI install pattern, but it requires trusting the upstream release.
curl -sL https://github.com/paperzilla-ai/pz/releases/latest/download/pz_linux_amd64.tar.gz | tar xz sudo mv pz /usr/local/bin/
Install only if you trust Paperzilla’s distribution channel; prefer package-manager installs where available and verify releases/checksums if provided.
The CLI may access Paperzilla projects and feeds tied to your account.
The skill requires authenticating to a Paperzilla account, which is expected for browsing account-specific projects and feeds but still grants the CLI delegated account access.
Log in with your Paperzilla account before doing anything else: ```bash pz login ```
Use the intended Paperzilla account, review the CLI’s authentication flow, and revoke access if you no longer use the tool.
Sharing or pasting the Atom URL could disclose access to your Paperzilla feed.
The Atom integration can expose a token-bearing URL. That is purpose-aligned for RSS/Atom readers, but the URL should be treated like a secret because anyone with it may be able to access the feed.
This prints a URL with an embedded feed token.
Only put the tokenized feed URL into trusted feed readers and revoke/regenerate it if it is exposed.
