Intiface Control

v1.0.1

Control 750+ BLE intimate devices (Lovense, Kiiroo, We-Vibe, Satisfyer, etc.) from natural language via Intiface Central and buttplug-mcp. Works on macOS, Wi...

0· 275·0 current·0 all-time
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description match the declared requirements: the skill is instruction-only and calls mcporter → buttplug-mcp → Intiface Central → local devices. Required binaries (mcporter, buttplug-mcp) are appropriate and no unrelated credentials/config paths are requested.
Instruction Scope
SKILL.md instructs the agent to run local commands (mcporter calling buttplug-mcp) and to interact with Intiface Central on ws://localhost:12345 to control physical Bluetooth/USB devices — this is exactly the skill's purpose. Note: these commands directly actuate physical devices, so runtime control has real-world effects and should be consented to by the user.
Install Mechanism
The skill is instruction-only (no install spec). It directs users to install buttplug-mcp from a GitHub Releases page (reasonable) and to use a third-party Homebrew tap (conacademy) for macOS. Adding external Homebrew taps or installing binaries from non-official taps has modest additional risk — verify the tap/source before installing.
Credentials
No environment variables, credentials, or config paths are requested. The lack of secret requirements is proportionate to the described local-device-control purpose.
Persistence & Privilege
always:false (normal). The skill allows normal autonomous invocation (platform default). Because the skill controls physical devices, permitting autonomous invocation increases risk: ensure the agent is only allowed to call this skill with explicit user consent or appropriate guardrails.
Assessment
This skill appears to do what it says: it provides instructions so the agent can use mcporter + buttplug-mcp to talk to Intiface Central and control nearby BLE/USB devices. Before installing or enabling it: (1) Confirm you trust the Homebrew tap (conacademy) or prefer to install buttplug-mcp directly from the project's official GitHub releases; (2) Be aware the agent will run local commands that physically actuate devices — only enable autonomous use if you are comfortable with that behavior and have given explicit consent; (3) Ensure Intiface Central is installed, open, and configured on the host (it listens on ws://localhost:12345); (4) If you want lower risk, do not grant the agent unrestricted autonomous invocation of this skill and require explicit user confirmation before running any device commands.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

Binsmcporter, buttplug-mcp
blevk972y064spvv9abe6jt5t1qnq982f6vwbuttplugvk972y064spvv9abe6jt5t1qnq982f6vwcross-platformvk972y064spvv9abe6jt5t1qnq982f6vwintifacevk972y064spvv9abe6jt5t1qnq982f6vwkiiroovk972y064spvv9abe6jt5t1qnq982f6vwlatestvk974wed1b2xe3pqyvz4d9qzxzs82ha6dlovensevk972y064spvv9abe6jt5t1qnq982f6vwsatisfyervk972y064spvv9abe6jt5t1qnq982f6vwsmart-devicevk972y064spvv9abe6jt5t1qnq982f6vwvibratorvk972y064spvv9abe6jt5t1qnq982f6vwwe-vibevk972y064spvv9abe6jt5t1qnq982f6vw
275downloads
0stars
2versions
Updated 1mo ago
v1.0.1
MIT-0

Universal Intimate Device Control via Intiface

Control any Buttplug.io-compatible device — 750+ toys across all major brands — using natural language through OpenClaw.

How it works

OpenClaw agent
    → mcporter (stdio)
    → buttplug-mcp
    → Intiface Central (WebSocket)
    → Your device (Bluetooth / USB)

No reverse-engineering, no device-specific code. Works on macOS, Windows, and Linux.


Prerequisites

  • Intiface Central — free desktop app (cross-platform)
  • buttplug-mcp — MCP bridge for Buttplug/Intiface
  • mcporter — installed via OpenClaw's mcporter skill

Install buttplug-mcp

macOS (Homebrew):

brew tap conacademy/homebrew-tap
brew install conacademy/tap/buttplug-mcp

Other platforms: Download from ConAcademy/buttplug-mcp


Setup (one time)

Step 1 — Install and open Intiface Central

Download from intiface.com/central. Open the app and click Start Server. Leave it running — it listens on ws://localhost:12345 by default.

Step 2 — Connect your device

In Intiface Central, click Start Scanning. Power on your toy. Once it appears in the device list, scanning can be stopped.

Step 3 — Install mcporter skill

Ask OpenClaw: install skill mcporter


Commands the agent will use

List connected devices

mcporter call --stdio "buttplug-mcp --ws-port 12345" device_vibrate --list

Vibrate a device

mcporter call --stdio "buttplug-mcp --ws-port 12345" device_vibrate id=0 strength=0.7
  • id: device index (0 = first device)
  • strength: 0.0 to 1.0 (0.0 = stop)

Stop

mcporter call --stdio "buttplug-mcp --ws-port 12345" device_vibrate id=0 strength=0.0

Strength guide

ValueFeel
0.1–0.2Gentle
0.3–0.5Medium
0.6–0.8Strong
0.9–1.0Maximum

Supported brands (partial list)

Lovense · Kiiroo · We-Vibe · Satisfyer · The Handy · OSR-2/SR-6 · and 700+ more


Agent rules

  • Always stop (strength 0.0) after a timed session unless the user says otherwise
  • Use device id=0 unless the user specifies a different device
  • Intiface Central must be running before calling any commands — remind the user if commands fail
  • Do not use the notify tool

Troubleshooting

ProblemFix
connection refusedOpen Intiface Central and click Start Server
Device not foundClick Start Scanning in Intiface Central, power cycle the toy
buttplug-mcp not foundRun brew install conacademy/tap/buttplug-mcp
mcporter not foundAsk OpenClaw: install skill mcporter
Wrong device indexList devices first, use the correct id

Comments

Loading comments...