revol-suno-headless-skill

MaliciousAudited by ClawScan on May 10, 2026.

Overview

This skill is built to automate Suno by bypassing Google and hCaptcha protections while collecting and persisting account cookies, which can put your accounts at risk.

Do not install this as-is. It asks for highly sensitive Google/Suno login material, stores reusable session cookies, and is explicitly designed to bypass anti-automation and CAPTCHA protections. If you already used it, revoke active sessions, rotate any shared API keys or passwords, and delete the stored ~/.suno cookies/profile files.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using this skill may bypass service security controls, trigger account locks, or violate provider policies while automating actions on the user's Suno/Google account.

Why it was flagged

The documented workflow explicitly evades anti-automation checks and automates CAPTCHA solving, which goes beyond ordinary browser automation.

Skill content
通过 Xvfb 虚拟显示...运行 Chrome GUI 模式,绕过 Google 反自动化检测...创建歌曲时 Suno 会弹出验证码,需要 Gemini API Key 来自动解决 hCaptcha 验证码
Recommendation

Do not use this bypass workflow. Prefer official APIs or normal user-driven login and CAPTCHA handling; remove anti-detection and automated CAPTCHA-solving behavior.

What this means

A password or cookie file can grant account access; anyone with access to the server or files may be able to reuse the user's Suno/Google session.

Why it was flagged

The skill asks for primary Google credentials or transferable session cookies and uploads them to a server, while the registry declares no primary credential.

Skill content
请提供:1. Gmail 邮箱地址 2. Gmail 密码...Cookie 导入(🌟 推荐!完美绕过 Google 安全验证)...scp <本地导出的Cookie文件> user@your-server:/root/suno_cookie/suno_cookies.json
Recommendation

Do not provide Gmail passwords or full session cookies to the skill. If already used, revoke sessions, rotate relevant credentials, and remove stored cookie/profile files.

What this means

Users may provide sensitive login material under a false sense that no reusable authentication data is retained.

Why it was flagged

This reassurance is misleading because the artifacts show persistent cookie/browser-profile storage and use of Google/Suno/Gemini services during the workflow.

Skill content
你的凭据仅用于本次登录,不会被存储或传输到任何第三方。
Recommendation

Remove the misleading privacy claim and clearly disclose all stored session material, external services used, command-line exposure risks, and cleanup steps.

What this means

This can break or alter other tools using the same package and makes the installed environment harder to audit or restore.

Why it was flagged

The patch rewrites an installed third-party package in place and broadens hCaptcha frame matching, affecting the local Python environment outside this one script.

Skill content
CHALLENGER_FILE = mod.__file__...with open(CHALLENGER_FILE, "w") as f: f.writelines(new_lines)...contains(@src, '/captcha/v1/')
Recommendation

Avoid modifying site-packages in place. Use a pinned, isolated virtual environment or a reviewed fork, and provide a clear rollback path.

ConcernHigh Confidence
ASI10: Rogue Agents
What this means

Future invocations can act through the stored session without re-entering credentials, and compromise of the host can expose account access.

Why it was flagged

The skill stores reusable cookies and a persistent browser profile, enabling continued account automation after the original login.

Skill content
DEFAULT_COOKIE_FILE = os.path.expanduser("~/.suno/cookies.json")
DEFAULT_USER_DATA_DIR = os.path.expanduser("~/.suno/chrome_gui_profile")
Recommendation

Require explicit user approval before each account action, provide a cleanup command for ~/.suno cookies/profile data, and avoid long-lived reusable sessions when possible.