Back to skill
Skillv1.1.0

ClawScan security

X To Notebook · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 8, 2026, 2:42 PM
Verdict
Benign
Confidence
medium
Model
gpt-5-mini
Summary
The skill's code and runtime instructions match its stated purpose (pushing X bookmarks into NotebookLM) and its requested binaries; the main user-sensitive action is reading browser cookies saved to ~/.openclaw/credentials/x-cookies.json, which is explained in the docs.
Guidance
This skill appears to do what it claims, but before installing you should: (1) be comfortable exporting your X browser cookies to ~/.openclaw/credentials/x-cookies.json — those cookies grant access to your account session and are sensitive; (2) verify you trust the skill source since it will read that cookie file and call twikit and mcporter locally; (3) note the skill will create and update ~/.openclaw/data/x-bookmarks-pushed.json to track pushed IDs; (4) ensure you want to install and register the NotebookLM MCP tool (mcporter/notebooklm-mcp-cli) and have Chrome for nlm login; (5) review the included Python files yourself if you want to confirm there are no surprises, especially if you plan to run auto_sync.py unattended. If any of these steps are unacceptable, do not install or run the skill.

Review Dimensions

Purpose & Capability
okName/description, scripts, and SKILL.md all consistently implement fetching X bookmarks with twikit and pushing them to NotebookLM via mcporter. Required binaries (uv, mcporter) and the notebookmcp dependency are appropriate for the described flow. Minor doc mismatch: README initially says bookmarks are pushed as URL sources while SKILL.md and changelog state tweets are pushed as text sources (the code pushes text).
Instruction Scope
okRuntime instructions are specific and bounded: list folders, fetch bookmarks, match to notebooks, push via mcporter, mark pushed. They reference only the cookie file and local pushed-IDs file needed for operation; there are no instructions to read unrelated system files or to send data to external endpoints beyond twikit/mcporter calls.
Install Mechanism
okNo install spec that downloads arbitrary code; the package contains Python scripts that are run via the uv tool. Prerequisite installs (twikit, notebooklm-mcp-cli) are third-party tools but are stated explicitly. No suspicious remote download URLs or extract steps are present in the skill bundle itself.
Credentials
noteThe skill does not request environment variables or external credentials, which is coherent. However it requires the user to export their X session cookies to ~/.openclaw/credentials/x-cookies.json (sensitive). The registry metadata listed no required config paths, but the code and SKILL.md clearly rely on that cookie path and on a local pushed-IDs file (~/.openclaw/data/x-bookmarks-pushed.json). This should be understood as necessary for the feature but is a privacy-sensitive local dependency.
Persistence & Privilege
okalways is false and the skill does not modify other skills or system-wide settings. It writes to ~/.openclaw under its own paths (credentials and data) which is normal for user tools. The presence of an auto_sync.py mode indicates it can be run unattended (cron), but the skill does not force permanent/invisible installation.