Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Video Audio Extractor

v1.0.0

Skip the learning curve of professional editing software. Describe what you want — extract the audio track from this video as a separate file — and get extra...

0· 22·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's name/description align with the actions in SKILL.md (upload video, start session, render, return download). Requesting a NEMO_TOKEN is appropriate for a cloud processing service. However, the SKILL.md frontmatter lists a config path (~/.config/nemovideo/) while the registry metadata reported none — an inconsistency in what the skill declares it needs to access.
Instruction Scope
Instructions are focused on interacting with the nemovideo.ai API (session creation, upload, SSE, render polling). They do not instruct reading arbitrary user files or secrets beyond the service token. Minor scope creep: headers require auto-detection of 'install path' for X-Skill-Platform (implies inspecting environment/install path) and frontmatter claims a config path — neither is fully explained in the registry metadata.
Install Mechanism
This is an instruction-only skill with no install spec and no code files, which is the lowest-risk install mechanism.
!
Credentials
The skill declares NEMO_TOKEN as the primary required credential — appropriate for the described cloud service — but SKILL.md also instructs the agent to automatically obtain an anonymous token if NEMO_TOKEN is not present. Requiring a token in registry metadata while providing an anonymous fallback is inconsistent. Frontmatter also lists a config path (~/.config/nemovideo/) that could contain stored tokens; that access was not declared in the registry. These mismatches increase the chance of unexpected token usage or storage.
Persistence & Privilege
The skill does not request always: true, does not install binaries, and does not modify other skills or system-wide settings. Autonomous invocation is allowed (platform default) but is not combined with other concerning privileges here.
What to consider before installing
This skill appears to do what it says (upload video, call nemo backend, return audio/video exports), but there are some red flags you should consider before installing or using it: - Inconsistent declarations: the registry metadata lists no config paths, but the SKILL.md frontmatter mentions ~/.config/nemovideo/. Check that directory for stored tokens or credentials after use. - Token handling: the skill requires NEMO_TOKEN but will auto-request an anonymous 7-day token if none is present. That means the agent will call an external API on first use and receive a bearer token. If you prefer control, supply your own NEMO_TOKEN (or avoid giving one) and be aware of where tokens are stored. - Attribution headers: the skill asks to auto-detect an install path for X-Skill-Platform; confirm that the agent will not probe sensitive filesystem locations to produce this value. - Privacy: uploading video files to a third-party backend can expose sensitive content. Only upload material you are comfortable sending to the stated domain (mega-api-prod.nemovideo.ai). Verify TLS and consider using an account with minimal privileges/credits. - Source verification: there is no homepage or known publisher. Prefer skills with a verifiable homepage, source repo, or publisher identity. What would change this assessment: explicit registry metadata matching SKILL.md (declared config paths, clear optional vs required credential behavior), a known publisher/homepage, or an explanation of where/how anonymous tokens and session data are stored and rotated. If you proceed, monitor network calls during first use and inspect ~/.config/nemovideo/ for stored tokens; create an account or token with limited scope if possible.

Like a lobster shell, security has layers — review code before you run it.

latestvk970fapttrnxm843tr3pc9wq0184q3dy

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🎵 Clawdis
EnvNEMO_TOKEN
Primary envNEMO_TOKEN

Comments