suspicious.exposed_secret_literal
- Location
- SKILL.md:32
- Finding
- File appears to expose a hardcoded API secret or token.
AdvisoryAudited by Static analysis on May 10, 2026.
Detected: suspicious.exposed_secret_literal, suspicious.potential_exfiltration
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Users or agents may run jobs against an unknown shared account, consume someone else's credits, or rely on a key that is already compromised.
The skill publishes a specific Kameo API key instead of using a placeholder, while the registry declares no primary credential or required environment variable.
export KAMEO_API_KEY="kam_I3rd...T7fs"
Revoke the exposed key, replace it with a placeholder, and declare KAMEO_API_KEY as a required credential so each user supplies their own key.
A user could expose account credentials through a nonfunctional or incorrectly configured helper, and command-line passwords may also appear in shell history or process listings.
The registration helper asks for an email and password and posts them to a placeholder Supabase URL, not a clearly configured Kameo authentication endpoint.
SUPABASE_URL="https://YOUR_PROJECT.supabase.co" ... Usage: $0 <email> <password> ... curl -s -X POST "$SUPABASE_URL/auth/v1/signup"
Do not use the registration helper until the real Kameo auth endpoint is verified; avoid passing passwords on the command line and document credential handling in metadata.
If an agent passes untrusted dialogue or filenames into the enhanced workflow, a crafted value could execute local code under the user's account.
User-controlled image paths and dialogue are interpolated directly into an unquoted Python heredoc, so crafted quotes or newlines can alter the generated Python source.
python3 << PYEOF ... with open("$IMAGE_PATH", 'rb') as f: ... enhanced = text.replace("[DIALOGUE]", "$DIALOGUE")Quote the heredoc delimiter, pass user inputs through argv or environment variables, and JSON/string-escape all values before using them in Python.
Portraits, avatars, and prompt text submitted to the skill are sent to Kameo, and enhanced mode also analyzes the selected image with Gemini.
The selected local image is encoded and sent to the Kameo API, which is necessary for the stated video-generation purpose but still transfers user content to an external provider.
"image_base64": "$(base64 -w0 "$IMAGE_PATH" ...)"; curl -s -X POST "$API_BASE/generate"
Use only images and dialogue you are allowed to upload to those providers, and review provider retention/privacy terms before processing sensitive faces or private media.