Back to skill
v1.0.0

Free Video Generator No Credits

BenignClawScan verdict for this skill. Analyzed Apr 30, 2026, 11:19 PM.

Analysis

This instruction-only skill is broadly aligned with cloud video generation, but users should understand that prompts and media are sent to a third-party NemoVideo backend using a token-based session.

GuidanceBefore installing, be comfortable with sending video, image, audio, and prompt content to the NemoVideo cloud service. Keep NEMO_TOKEN private, verify the provider and pricing/credit terms, and only upload files you intentionally want processed remotely.

Findings (8)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

Abnormal behavior control

Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.

Agent Goal Hijack
SeverityLowConfidenceHighStatusNote
SKILL.md
Backend says | You do ... "click [button]" / "点击" | Execute via API ... "Export button" / "导出" | Execute export workflow

The skill instructs the agent to translate backend text into follow-up API actions. This is aligned with the cloud video workflow, but it means provider responses can influence the agent's next actions.

User impactThe remote backend can guide parts of the editing/export workflow after the user starts a task.
RecommendationUse the skill for intended video tasks and review important actions such as uploads and exports before relying on the result.
Tool Misuse and Exploitation
SeverityLowConfidenceHighStatusNote
SKILL.md
Upload: POST `/api/upload-video/nemo_agent/me/<sid>` — file: multipart `-F "files=@/path"`, or URL: `{"urls":["<url>"],"source_type":"url"}` ... Export ... Poll GET ... until `status` = `completed`.

The skill exposes upload and render/export API operations. These are central to video generation, but users should notice that local files or URLs may be sent to the cloud service.

User impactFiles or URLs selected for the workflow may be uploaded and processed remotely.
RecommendationOnly provide media you intend to send to NemoVideo, and avoid uploading private or unrelated local files.
Agentic Supply Chain Vulnerabilities
SeverityInfoConfidenceMediumStatusNote
metadata
Source: unknown; Homepage: none

The skill has limited provenance information. There are no code files or install steps, so the local supply-chain risk is low, but the remote service identity is not independently described by the registry metadata.

User impactUsers have less registry-provided context for verifying who operates the backend service.
RecommendationVerify the NemoVideo service and domain before uploading sensitive or business-critical media.
Cascading Failures
SeverityLowConfidenceHighStatusNote
SKILL.md
The session token carries render job IDs, so closing the tab before completion orphans the job.

Render jobs can continue on the cloud backend even if the local UI/session is closed. This is a normal cloud-rendering concern, not evidence of malicious propagation.

User impactA render job might continue running remotely after the user stops watching the session.
RecommendationAvoid starting unnecessary exports and wait for completion or provider-side cancellation options when available.
Human-Agent Trust Exploitation
SeverityInfoConfidenceMediumStatusNote
SKILL.md
Free Video Generator No Credits ... `data.token` ... NEMO_TOKEN (100 free credits, 7-day expiry) ... Tip: you can re-render and adjust your video as many times as you need without losing credits.

The skill uses strong promotional language about being free/no-credits while also referencing credits and token expiry. This is not evidence of malicious behavior, but users should verify service terms.

User impactUsers may rely on the free/no-credit claim without checking actual service limits or terms.
RecommendationCheck credit, export, and retention terms before using the service for high-volume or important work.
Permission boundary

Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.

Identity and Privilege Abuse
SeverityLowConfidenceHighStatusNote
SKILL.md
Token check: Look for `NEMO_TOKEN` in the environment ... POST `https://mega-api-prod.nemovideo.ai/api/auth/anonymous-token` ... Extract `data.token` from the response — this is your NEMO_TOKEN

The skill uses or creates a NemoVideo bearer token. This is expected for the integrated cloud service, and the instructions say not to expose tokens.

User impactThe token can identify the session and authorize video-rendering operations with the backend.
RecommendationKeep NEMO_TOKEN private and use a dedicated token for this service if possible.
Sensitive data protection

Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.

Memory and Context Poisoning
SeverityLowConfidenceHighStatusNote
SKILL.md
Keep the returned `session_id` for all operations ... Session state: GET `/api/state/nemo_agent/me/<sid>/latest` — key fields: `data.state.draft`, `data.state.video_infos`, `data.state.generated_media`

The skill relies on remote session state and draft data to continue and export work. This is purpose-aligned, but state can contain user media and editing context.

User impactUploaded/generated media and draft state may be reused within the remote session to produce the final video.
RecommendationReview the timeline or state summary before export, and avoid sending confidential content unless you trust the service.
Insecure Inter-Agent Communication
SeverityLowConfidenceHighStatusNote
SKILL.md
Send message (SSE): POST `/run_sse` — body `{"app_name":"nemo_agent","user_id":"me","session_id":"<sid>","new_message":{"parts":[{"text":"<msg>"}]}}`

The skill communicates with a remote `nemo_agent` backend over SSE. The endpoint and bearer authentication are specified, but user prompts and workflow data leave the local agent context.

User impactThe remote agent/provider receives prompts and may return workflow instructions for editing and rendering.
RecommendationTreat the backend as a third-party processor and do not submit sensitive material unless that is acceptable.