notebooklm-exporter
Pass
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides a collection of Bash scripts (
notebook_ops.sh,source_ops.sh,artifact_ops.sh, etc.) that act as wrappers for thenotebooklmCLI tool. These scripts allow the agent to manage NotebookLM notebooks, sources, and artifacts. All command arguments are handled using Bash arrays (e.g.,"${ARGS[@]}"), which effectively prevents shell injection within the wrapper logic by ensuring variables are not re-interpreted as shell commands.\n- [EXTERNAL_DOWNLOADS]: The skill facilitates the download of generated artifacts (such as audio, video, and documents) from the NotebookLM platform to the local filesystem usingdownload_artifact.sh. It also provides instructions for installing thenotebooklm-pypackage from PyPI and the Playwright browser dependencies.\n- [PROMPT_INJECTION]: The skill possesses an attack surface for indirect prompt injection (Category 8) because it processes untrusted data from external URLs, files, and research queries through thesource_ops.shandgenerate_and_download.shscripts.\n - Ingestion points: Ingests external content via
source_ops.sh add(--content) andsource_ops.sh research(--query).\n - Boundary markers: No delimiters or explicit safety warnings are used when passing external content to the CLI tool to mitigate obedience to embedded instructions.\n
- Capability inventory: The skill can write to the local filesystem (via
download) and execute thenotebooklmtool.\n - Sanitization: No input validation or sanitization is performed on external content before it is passed to the underlying CLI for processing.
Audit Metadata