notebooklm
Audited by Socket on Feb 16, 2026
1 alert found:
Malware[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] BENIGN with elevated operational risk due to browser-automation fallbacks and multi-agent context. The skill's footprint—authentication handling, browser-based extraction for anti-crawler platforms, local temporary file usage, and integration with NotebookLM—fits its stated automation purpose. Care should be taken in CI/CD usage to secure authentication state and ensure proper isolation between parallel agents to prevent context overwrites. No explicit malicious behavior detected; the structure is coherent with its described functionality. LLM verification: The skill's stated purpose (automating NotebookLM, including extracting content from anti-crawler sites using Playwright) aligns with its described capabilities. There are no explicit signs of obfuscation or hidden exfiltration to attacker-controlled domains in the provided text. However, several supply-chain and privilege concerns make this skill suspicious rather than benign: (1) automatic, non-confirmed browser extraction using authenticated sessions can fetch and upload private content witho