Intiface Control

v1.0.1

Control 750+ BLE intimate devices (Lovense, Kiiroo, We-Vibe, Satisfyer, etc.) from natural language via Intiface Central and buttplug-mcp. Works on macOS, Wi...

0· 239·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description match the declared requirements: the skill is instruction-only and calls mcporter → buttplug-mcp → Intiface Central → local devices. Required binaries (mcporter, buttplug-mcp) are appropriate and no unrelated credentials/config paths are requested.
Instruction Scope
SKILL.md instructs the agent to run local commands (mcporter calling buttplug-mcp) and to interact with Intiface Central on ws://localhost:12345 to control physical Bluetooth/USB devices — this is exactly the skill's purpose. Note: these commands directly actuate physical devices, so runtime control has real-world effects and should be consented to by the user.
Install Mechanism
The skill is instruction-only (no install spec). It directs users to install buttplug-mcp from a GitHub Releases page (reasonable) and to use a third-party Homebrew tap (conacademy) for macOS. Adding external Homebrew taps or installing binaries from non-official taps has modest additional risk — verify the tap/source before installing.
Credentials
No environment variables, credentials, or config paths are requested. The lack of secret requirements is proportionate to the described local-device-control purpose.
Persistence & Privilege
always:false (normal). The skill allows normal autonomous invocation (platform default). Because the skill controls physical devices, permitting autonomous invocation increases risk: ensure the agent is only allowed to call this skill with explicit user consent or appropriate guardrails.
Assessment
This skill appears to do what it says: it provides instructions so the agent can use mcporter + buttplug-mcp to talk to Intiface Central and control nearby BLE/USB devices. Before installing or enabling it: (1) Confirm you trust the Homebrew tap (conacademy) or prefer to install buttplug-mcp directly from the project's official GitHub releases; (2) Be aware the agent will run local commands that physically actuate devices — only enable autonomous use if you are comfortable with that behavior and have given explicit consent; (3) Ensure Intiface Central is installed, open, and configured on the host (it listens on ws://localhost:12345); (4) If you want lower risk, do not grant the agent unrestricted autonomous invocation of this skill and require explicit user confirmation before running any device commands.

Like a lobster shell, security has layers — review code before you run it.

blevk972y064spvv9abe6jt5t1qnq982f6vwbuttplugvk972y064spvv9abe6jt5t1qnq982f6vwcross-platformvk972y064spvv9abe6jt5t1qnq982f6vwintifacevk972y064spvv9abe6jt5t1qnq982f6vwkiiroovk972y064spvv9abe6jt5t1qnq982f6vwlatestvk974wed1b2xe3pqyvz4d9qzxzs82ha6dlovensevk972y064spvv9abe6jt5t1qnq982f6vwsatisfyervk972y064spvv9abe6jt5t1qnq982f6vwsmart-devicevk972y064spvv9abe6jt5t1qnq982f6vwvibratorvk972y064spvv9abe6jt5t1qnq982f6vwwe-vibevk972y064spvv9abe6jt5t1qnq982f6vw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Binsmcporter, buttplug-mcp

Comments