Is spotify-player safe?

https://clawhub.ai/steipete/spotify-player

88
SAFE

This skill is a documentation-only Spotify playback controller that provides CLI usage instructions for spogo and spotify_player. It contains no executable code, no hidden instructions, and no exfiltration mechanisms. The primary concern is the browser cookie import command for Spotify authentication, which is a legitimate but elevated-privilege operation that should require explicit user consent. The third-party Homebrew tap dependency extends the trust chain but follows standard distribution practices.

Category Scores

Prompt Injection 90/100 · 30%
Data Exfiltration 85/100 · 25%
Code Execution 95/100 · 20%
Clone Behavior 90/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 75/100 · 5%

Findings (5)

MEDIUM Browser cookie import instruction -10

The skill instructs the agent to run 'spogo auth import --browser chrome' which reads Chrome browser cookies to authenticate with Spotify. While this is the legitimate auth flow for spogo, it represents an elevated privilege operation that accesses sensitive browser session data. An agent following this instruction without explicit user confirmation could inadvertently expose session tokens.

LOW Cookie extraction via spogo binary -10

The spogo auth import command reads Chrome cookies and passes them to the spogo binary. The security of this operation depends entirely on the trustworthiness of the spogo binary installed from the third-party Homebrew tap steipete/tap. The skill itself does not exfiltrate data, but it creates a pathway where a compromised binary could.

LOW Third-party Homebrew tap dependency -5

The skill's install metadata references steipete/tap, a third-party Homebrew tap. Users must trust this tap maintainer for binary integrity. This is standard practice for non-core Homebrew packages but extends the trust chain beyond the skill itself.

INFO OpenClaw runtime accesses sensitive files during bootstrap -10

Filesystem monitoring captured OPEN events on /home/oc-exec/.env and /home/oc-exec/.aws/credentials. These are attributable to the OpenClaw gateway runtime initialization (evidenced by the gateway.e9191928.lock creation and jiti module compilation occurring at the same timestamps), not to the skill under test.

INFO Skill is documentation-only with no executable payload -5

The entire skill consists of a single SKILL.md file with CLI documentation and metadata. There is no executable code, no build scripts, no hooks, and no hidden content. The skill's attack surface is limited to the instructions it provides to the agent.