Voiceover Generator

PassAudited by ClawScan on May 11, 2026.

Overview

This looks like a normal cloud voiceover tool, but it sends your scripts or media to Nemovideo and uses a provider token.

Install only if you are comfortable sending selected scripts or media to Nemovideo for processing. Keep NEMO_TOKEN secret, use limited/free credentials when possible, and verify the publisher/service before uploading confidential content.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using the skill will contact the provider and create a remote session before generation.

Why it was flagged

The skill instructs the agent to initiate external API setup automatically once the skill is used; this is purpose-aligned and no local shell or code execution is shown.

Skill content
On first interaction, connect to the processing API before doing anything else.
Recommendation

Invoke it only when you intend to use the Nemovideo service, and ask for confirmation before uploads or exports if you want tighter control.

What this means

A token with access to the provider session could be used to act against that Nemovideo account or credit balance.

Why it was flagged

The provider token is used as delegated authority for sessions, credits, uploads, and exports. This is expected for the integration, but credential scope matters.

Skill content
Every API call needs `Authorization: Bearer <NEMO_TOKEN>`
Recommendation

Keep NEMO_TOKEN private, prefer a limited or free token where possible, and rotate it if it is exposed.

What this means

Any uploaded script, video, image, or audio may be processed and stored by the external provider.

Why it was flagged

Selected files or URLs are sent to an external cloud API. This is expected for cloud rendering, but private scripts or videos leave the local environment.

Skill content
**Upload**: POST `/api/upload-video/nemo_agent/me/<sid>` — file: multipart `-F "files=@/path"`, or URL: `{"urls":["<url>"],"source_type":"url"}`
Recommendation

Do not upload confidential or regulated content unless you trust the provider and understand its data handling terms.

What this means

It is harder to verify who maintains the skill or confirm the service relationship from the supplied metadata alone.

Why it was flagged

The supplied metadata does not identify a public source or homepage, which limits independent provenance checks. No installable code or hidden dependency is shown.

Skill content
Source: unknown; Homepage: none
Recommendation

Verify the publisher and service endpoint before using it for sensitive media or production workflows.