kameo
PassAudited by VirusTotal on May 12, 2026.
Overview
Type: OpenClaw Skill Name: kameo Version: 1.0.1 The skill is designed to interact with the Kameo AI API for video generation and Google Gemini for prompt enhancement. It sends user-provided images and prompts to these external services, which is explicitly documented and central to its stated purpose. While this involves sending sensitive data (images, API keys, and potentially user credentials during registration) to third-party APIs, there is no evidence of intentional malicious behavior such as unauthorized data exfiltration, backdoors, or prompt injection against the OpenClaw agent. The `register.sh` script contains placeholder API keys, preventing immediate functionality or malicious use, and its intended purpose is legitimate account management.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Users or agents may run jobs against an unknown shared account, consume someone else's credits, or rely on a key that is already compromised.
The skill publishes a specific Kameo API key instead of using a placeholder, while the registry declares no primary credential or required environment variable.
export KAMEO_API_KEY="kam_I3rd...T7fs"
Revoke the exposed key, replace it with a placeholder, and declare KAMEO_API_KEY as a required credential so each user supplies their own key.
A user could expose account credentials through a nonfunctional or incorrectly configured helper, and command-line passwords may also appear in shell history or process listings.
The registration helper asks for an email and password and posts them to a placeholder Supabase URL, not a clearly configured Kameo authentication endpoint.
SUPABASE_URL="https://YOUR_PROJECT.supabase.co" ... Usage: $0 <email> <password> ... curl -s -X POST "$SUPABASE_URL/auth/v1/signup"
Do not use the registration helper until the real Kameo auth endpoint is verified; avoid passing passwords on the command line and document credential handling in metadata.
If an agent passes untrusted dialogue or filenames into the enhanced workflow, a crafted value could execute local code under the user's account.
User-controlled image paths and dialogue are interpolated directly into an unquoted Python heredoc, so crafted quotes or newlines can alter the generated Python source.
python3 << PYEOF ... with open("$IMAGE_PATH", 'rb') as f: ... enhanced = text.replace("[DIALOGUE]", "$DIALOGUE")Quote the heredoc delimiter, pass user inputs through argv or environment variables, and JSON/string-escape all values before using them in Python.
Portraits, avatars, and prompt text submitted to the skill are sent to Kameo, and enhanced mode also analyzes the selected image with Gemini.
The selected local image is encoded and sent to the Kameo API, which is necessary for the stated video-generation purpose but still transfers user content to an external provider.
"image_base64": "$(base64 -w0 "$IMAGE_PATH" ...)"; curl -s -X POST "$API_BASE/generate"
Use only images and dialogue you are allowed to upload to those providers, and review provider retention/privacy terms before processing sensitive faces or private media.
