Peekaboo 1

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If invoked incorrectly, the agent could click or type in the wrong app, change settings, submit forms, close work, or affect accounts through the visible UI.

Why it was flagged

The skill exposes broad UI-control authority to the agent, including actions that can click, type, paste, close windows, manage apps, and interact with dialogs. The artifacts do not describe approval or scoping guardrails for high-impact UI actions.

Skill content
Peekaboo is a full macOS UI automation CLI: capture/inspect screens, target UI elements, drive input, and manage apps/windows/menus.
Recommendation

Use this only when you want the agent to control your desktop. Ask for confirmation before clicks, typing, dialog actions, app quit/launch, or window-management commands, and restrict tasks to specific apps or windows.

What this means

Granting these permissions can let the automation see sensitive on-screen information and act with your local user authority in other applications.

Why it was flagged

These macOS permissions allow broad observation and control of the user interface across applications. They are purpose-aligned, but the artifacts do not bound them to a specific app, workflow, or time period.

Skill content
Requires Screen Recording + Accessibility permissions.
Recommendation

Grant Screen Recording and Accessibility only if you are comfortable with desktop-level automation, monitor its use, and revoke the permissions after you no longer need the skill.

What this means

Sensitive screen contents could remain in local cache or temp files after a task.

Why it was flagged

The CLI stores UI snapshots/cache data for reuse. This is expected for a screen-automation tool, but screenshots or UI maps may contain private information and the retention details are not specified.

Skill content
Commands share a snapshot cache ... `clean`: prune snapshot cache and temp files
Recommendation

Avoid capturing sensitive windows when possible and use Peekaboo's cleanup command after sensitive sessions.

What this means

If remote analysis is used, screenshots or UI-derived information may be sent to a configured model/provider.

Why it was flagged

The skill documents optional analysis through configured providers/models and includes a no-remote flag, indicating possible provider communication involving captured UI data. This appears disclosed and purpose-aligned, but data boundaries are not detailed.

Skill content
`config`: init/show/edit/validate, providers, models, credentials ... Analysis: `--analyze "prompt"` ... `--no-remote`
Recommendation

Check Peekaboo provider settings before using `--analyze`, use `--no-remote` when you need local-only behavior, and avoid remote analysis of sensitive screens.

What this means

Your trust depends on the upstream Homebrew formula and Peekaboo binary, especially because the tool requests powerful macOS permissions.

Why it was flagged

The reviewed skill is instruction-only and installs an external binary from a Homebrew tap. This is a normal CLI install pattern, but the installed binary itself was not included in the static scan artifacts.

Skill content
brew | formula: steipete/tap/peekaboo | creates binaries: peekaboo
Recommendation

Verify the Homebrew tap and Peekaboo project source before installing, and keep the binary updated from a trusted source.