Google Keep

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill does what it says for Google Keep, but it asks for a long-lived Google master token with full account access, which is broader and more sensitive than a normal Keep-only integration.

Review this carefully before installing. The CLI appears coherent for Google Keep management, but only use it if you are comfortable extracting a Google auth token, storing a non-expiring master token locally, and relying on an unofficial reverse-engineered API. Consider using a separate Google account and protect or delete the skill’s `.config/` directory when not needed.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the token is exposed or misused, it could affect more than just Google Keep and may remain valid indefinitely.

Why it was flagged

The credential requested for a Keep CLI is a long-lived Google master token with full account access, which is broader than a scoped Keep-only authorization.

Skill content
The master token grants **full access** to the associated Google account ... It does **not expire**
Recommendation

Use only with a dedicated or low-risk Google account if possible, protect and periodically remove/revoke the stored token, and prefer a scoped official OAuth flow if one becomes available.

What this means

Handling browser authentication tokens manually increases the chance of accidental disclosure through shell history, logs, screenshots, or copied commands.

Why it was flagged

The setup flow asks the user to manually extract a Google authentication cookie/token from the browser and pass it to the CLI.

Skill content
Open DevTools: F12 → Application tab → Cookies → accounts.google.com ... Copy the value of the `oauth_token` cookie ... Run: `gkeep auth <email> <oauth_token>`
Recommendation

Avoid pasting tokens into shared terminals or transcripts, clear shell history if needed, and only proceed if you understand the credential handling risk.

What this means

Private Google Keep note contents may be stored on disk outside Google Keep, so local device compromise or backups could expose them.

Why it was flagged

The code writes a local cached dump of Keep state to `.config/state.json`, protected with file permissions but still retaining potentially sensitive note content locally.

Skill content
with open(STATE_FILE, "w") as f:
        json.dump(keep.dump(), f)
    os.chmod(STATE_FILE, 0o600)
Recommendation

Keep the skill directory private, exclude `.config/` from backups or version control if appropriate, and delete the cache when uninstalling or after sensitive use.

What this means

An agent or user invoking the wrong command could modify, archive, trash, or export Keep notes.

Why it was flagged

The CLI exposes account-mutating and bulk-export commands. These are aligned with the stated Keep management purpose, but they can alter or reveal user data.

Skill content
`gkeep edit <id-or-title> --text "Updated text"` ... `gkeep delete <id-or-title>` ... `gkeep dump                # All notes as JSON`
Recommendation

Review commands before running them, be especially careful with delete/edit/dump operations, and consider requiring explicit user confirmation in workflows that call this CLI.

What this means

Future package changes or dependency compromise could affect what code runs inside the skill environment.

Why it was flagged

The install command pulls unpinned third-party Python packages, including an unofficial Google Keep client and OAuth helper.

Skill content
uv venv .venv && .venv/bin/pip install gkeepapi gpsoauth
Recommendation

Pin dependency versions, verify package provenance, and reinstall only from trusted package indexes.