Env credential access
- Finding
- Environment variable access combined with network send.
Security checks across static analysis, malware telemetry, and agentic risk
The skill appears to fetch YouTube captions as advertised, but users should notice that it uses a Felo API key and documents an optional unpinned npm CLI install path.
This skill is reasonable to use if you trust Felo with the YouTube video IDs you request and with your Felo API key. Set `FELO_API_KEY` carefully, avoid pointing `FELO_API_BASE` at an untrusted server, and verify the optional `felo-ai` npm package before installing it globally.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Using the skill sends your Felo API key, and the requested YouTube video ID, to the configured Felo API endpoint.
The skill uses a Felo API key as an authorization credential for the provider API. This is purpose-aligned and disclosed in SKILL.md, but registry metadata lists no required env vars or primary credential.
const apiKey = process.env.FELO_API_KEY?.trim(); ... Authorization: `Bearer ${apiKey}`Use a dedicated Felo API key if possible, keep it private, and only set `FELO_API_BASE` to a trusted endpoint.
If you choose the packaged CLI route, you would be installing and trusting an external npm package globally.
The documentation offers an optional globally installed npm CLI path, but the install spec does not declare or pin that package. This is not hidden or automatic, but it is an external dependency users should verify.
**Packaged CLI** (after `npm install -g felo-ai`):
Prefer the bundled script when possible, or verify the `felo-ai` npm package source and version before global installation.