kameo

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: kameo Version: 1.0.1 The skill is designed to interact with the Kameo AI API for video generation and Google Gemini for prompt enhancement. It sends user-provided images and prompts to these external services, which is explicitly documented and central to its stated purpose. While this involves sending sensitive data (images, API keys, and potentially user credentials during registration) to third-party APIs, there is no evidence of intentional malicious behavior such as unauthorized data exfiltration, backdoors, or prompt injection against the OpenClaw agent. The `register.sh` script contains placeholder API keys, preventing immediate functionality or malicious use, and its intended purpose is legitimate account management.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Users or agents may run jobs against an unknown shared account, consume someone else's credits, or rely on a key that is already compromised.

Why it was flagged

The skill publishes a specific Kameo API key instead of using a placeholder, while the registry declares no primary credential or required environment variable.

Skill content
export KAMEO_API_KEY="kam_I3rd...T7fs"
Recommendation

Revoke the exposed key, replace it with a placeholder, and declare KAMEO_API_KEY as a required credential so each user supplies their own key.

What this means

A user could expose account credentials through a nonfunctional or incorrectly configured helper, and command-line passwords may also appear in shell history or process listings.

Why it was flagged

The registration helper asks for an email and password and posts them to a placeholder Supabase URL, not a clearly configured Kameo authentication endpoint.

Skill content
SUPABASE_URL="https://YOUR_PROJECT.supabase.co" ... Usage: $0 <email> <password> ... curl -s -X POST "$SUPABASE_URL/auth/v1/signup"
Recommendation

Do not use the registration helper until the real Kameo auth endpoint is verified; avoid passing passwords on the command line and document credential handling in metadata.

ConcernMedium Confidence
ASI05: Unexpected Code Execution
What this means

If an agent passes untrusted dialogue or filenames into the enhanced workflow, a crafted value could execute local code under the user's account.

Why it was flagged

User-controlled image paths and dialogue are interpolated directly into an unquoted Python heredoc, so crafted quotes or newlines can alter the generated Python source.

Skill content
python3 << PYEOF ... with open("$IMAGE_PATH", 'rb') as f: ... enhanced = text.replace("[DIALOGUE]", "$DIALOGUE")
Recommendation

Quote the heredoc delimiter, pass user inputs through argv or environment variables, and JSON/string-escape all values before using them in Python.

What this means

Portraits, avatars, and prompt text submitted to the skill are sent to Kameo, and enhanced mode also analyzes the selected image with Gemini.

Why it was flagged

The selected local image is encoded and sent to the Kameo API, which is necessary for the stated video-generation purpose but still transfers user content to an external provider.

Skill content
"image_base64": "$(base64 -w0 "$IMAGE_PATH" ...)"; curl -s -X POST "$API_BASE/generate"
Recommendation

Use only images and dialogue you are allowed to upload to those providers, and review provider retention/privacy terms before processing sensitive faces or private media.