It depends upon how a lot belief you’ve gotten within the individuals you are lending it out to, when you’ve got the system in view always, and the way doubtless it’s that you simply’re being focused by somebody with the means to carry out such a hack.
Basically should you’re handed an “unknown” USB system (of any sort) to plug-in to your laptop, and also you have no idea the place it got here from, you ought to be suspicious of it. I.e. do not choose up USB pen-drives that you simply discovered on the bottom and plug it into your laptop.
On your scneario: To be able to exploit your laptop, the malicious particular person would wish to borrow your clicker system, take it someplace you can’t see it, modify it (the {hardware}) to incorporate the exploit, after which give it again to you.
Except you are giving talks at DEF CON or someplace comparable, the place you may count on somebody is attempting to actively hack you, or you’ve gotten some very invaluable info in your laptop computer, I do not suppose such a assault is one thing the peculiar particular person wants to fret a lot about (assuming you realize who the particular person you are lending the system to is).