Remotego

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill is transparent about its purpose, but it exposes arbitrary local terminal sessions through a public URL using an unreviewed npm tool, so it needs careful review before use.

Install or run this only if you intentionally want to share a terminal over the internet. Use a sandbox, container, or low-privilege account, keep the session URL private, avoid sensitive files and credentials, and stop the tunnel as soon as collaboration is finished.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used on a normal workstation, a shared terminal could let a remote participant run commands, inspect files, or interact with local tools in ways the user did not intend.

Why it was flagged

The skill exposes arbitrary commands, including shells and REPLs, through its remote terminal workflow rather than limiting the tool to a narrow, safer command set.

Skill content
remotego <command> [command-args...] [options]
Recommendation

Use only with explicit user approval, prefer a disposable container or low-privilege account, and avoid exposing unrestricted shells or sensitive working directories.

What this means

Remote access to a shell can indirectly expose local credentials, SSH agents, environment variables, project files, cloud CLIs, and other privileges already available to the user.

Why it was flagged

Mirroring an interactive shell can give remote viewers or collaborators access to a terminal running under the local user's operating-system privileges.

Skill content
Mirror bash | `remotego bash`
Recommendation

Run the tool only in an isolated account or sandbox with minimal credentials, and do not use it in directories or sessions containing secrets or privileged account access.

What this means

The package that creates the public terminal tunnel is not reviewable from the supplied artifacts, so users must trust external npm package contents and updates.

Why it was flagged

The reviewed artifact set contains only instructions, while the actual high-impact implementation is an external npm package installed globally or run via npx without a pinned version in the instructions.

Skill content
npm install -g @remotego/remotego
Recommendation

Pin and verify the npm package version, review the package source before use, and avoid global installation where possible.

What this means

Anyone who obtains the session URL may be able to view or interact with sensitive terminal activity, and terminal data may traverse a third-party tunnel provider.

Why it was flagged

Terminal input and output are routed through a public tunnel service, and the documented access control is URL possession plus a short authentication window.

Skill content
Creates a public tunnel via localhost.run
Recommendation

Treat the session URL as a secret, stop the tunnel immediately after use, avoid displaying secrets in the terminal, and prefer stronger authentication or private networking for sensitive work.