notebooklm

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] BENIGN with elevated operational risk due to browser-automation fallbacks and multi-agent context. The skill's footprint—authentication handling, browser-based extraction for anti-crawler platforms, local temporary file usage, and integration with NotebookLM—fits its stated automation purpose. Care should be taken in CI/CD usage to secure authentication state and ensure proper isolation between parallel agents to prevent context overwrites. No explicit malicious behavior detected; the structure is coherent with its described functionality. LLM verification: The skill's stated purpose (automating NotebookLM, including extracting content from anti-crawler sites using Playwright) aligns with its described capabilities. There are no explicit signs of obfuscation or hidden exfiltration to attacker-controlled domains in the provided text. However, several supply-chain and privilege concerns make this skill suspicious rather than benign: (1) automatic, non-confirmed browser extraction using authenticated sessions can fetch and upload private content witho

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 01:20 PM
Package URL
pkg:socket/skills-sh/ttmouse%2Fskills%2Fnotebooklm%2F@aecbd87ecd08c34ac54b23fe4302e4c0c3fa07df