notebooklm
Audited by Socket on Feb 27, 2026
1 alert found:
SecurityThe skill's stated purpose (querying Google NotebookLM via browser automation) aligns with most requested capabilities: visible Google login, notebook URLs, local library metadata, and browser-based queries. There is no explicit evidence of malicious code or third-party credential harvesting in the provided documentation. However, the automated install-and-run pattern (run.py creating venv, installing dependencies, and downloading Chromium) together with unpinned installs constitutes a non-trivial supply-chain risk. The follow-up loop that issues repeated automated queries increases autonomy risk: if dependencies or scripts are tampered with, notebook contents could be exfiltrated or abused. Recommendations: inspect run.py and the scripts to confirm there are no remote command executions, pinned dependency versions and integrity checks for downloads, restrict and document precisely what external domains are contacted, and protect stored auth/browser_state files (encryption, strict permissions). Overall, treat the skill as potentially vulnerable to supply-chain compromise (moderate risk) but not demonstrably malicious based on the provided content.