Claw Use — Device Control for AI Agents

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill openly aims to let agents control real devices, but it grants broad screen-reading, notification access, app control, messaging, remote access, and auto-unlock powers with little scoping or reviewed implementation.

Install only if you intentionally want an agent to control a real device. Prefer a dedicated test device, restrict network access, protect tokens and PINs, require confirmation for actions that type/send/open/unlock, and verify the external `cu` CLI and device server before use.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill could operate a real phone or other device, including typing into apps, opening links, and changing device state.

Why it was flagged

The skill exposes broad device-control commands that can tap, type, launch apps, open URLs, send platform intents, and lock or unlock a physical device. These powers are central to the purpose, but the artifacts do not bound when the agent may use them or require confirmation for high-impact actions.

Skill content
cu tap <x> <y> ... cu type "text" ... cu launch <app> ... cu open <url> ... cu intent '<json>' ... cu lock / cu unlock
Recommendation

Use only with trusted devices and sessions; require explicit confirmation for mutating actions such as typing, sending, unlocking, opening URLs, or launching apps.

What this means

The agent could perform actions under the user's identity on apps already signed in on the device, such as messaging, browsing, or account changes.

Why it was flagged

The skill relies on device access tokens and can unlock devices using a PIN, yet the registry declares no primary credential or required environment variables. Once connected, the agent may act through logged-in device apps and accounts.

Skill content
cu add redmi 192.168.0.105 <token> ... cu lock / cu unlock    # lock/unlock (PIN required for unlock)
Recommendation

Use a dedicated test device or limited account, protect and rotate device tokens, avoid storing PINs where the agent can access them, and revoke access when not in use.

What this means

Private information visible on the device or in notifications could be exposed to the agent context or saved as screenshots.

Why it was flagged

The skill can bring device UI text, screenshots, and notifications into the agent context. Those sources may contain private messages, one-time codes, account information, or untrusted app content, and the artifacts do not describe filtering, retention, or user approval boundaries.

Skill content
cu screen              # UI tree (semantic: element text, bounds, state)
cu screenshot          # visual capture (JPEG, configurable quality)
cu notifications       # system notifications
Recommendation

Disable or limit notifications, avoid using the skill on devices with sensitive content, and require user approval before screenshots or screen/notification reads.

What this means

Users must trust external software not included in the skill artifacts before giving an agent physical-device control.

Why it was flagged

The reviewed package contains only instructions, while the core high-impact functionality depends on an external CLI and device implementation. The registry also lists no install spec or required binary, so the executable code that controls devices is outside this review context.

Skill content
- `cu` CLI installed (ships with claw-use-android, or install standalone)
Recommendation

Install `cu` only from a trusted, pinned source; verify the device implementation; and treat the static scan result as not covering the external CLI or server.