Claw Alarm

AdvisoryAudited by Static analysis on May 5, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used without care, alarms could be disabled, deleted, or changed at the wrong time.

Why it was flagged

The helper exposes mutable alarm operations and a broad API wrapper. This is aligned with the skill’s purpose, but users should notice that the agent can change or delete alarms when invoked.

Skill content
Read, create, update, snooze, and delete alarms ... Every endpoint on the deployed worker is reachable through it
Recommendation

Require explicit confirmation before delete, disable, snooze, or broad update actions, and review the endpoint, method, and payload.

What this means

Anyone who obtains the token could read, create, modify, disable, or delete alarms on the paired phone.

Why it was flagged

The artifact acknowledges the bearer token grants alarm read/write authority, then recommends storage locations that can be shared, committed, or reused beyond the intended local pairing boundary.

Skill content
anyone holding it can read and rewrite the alarm list on the paired device ... safe to commit the token to a project-local `CLAUDE.md`, an `.env`, or any other config file you'd normally pin to a repo
Recommendation

Treat the token as a real secret: keep it out of repositories and shared CLAUDE.md files, store it in a private untracked environment file or secret store, and reset pairing if exposed.

What this means

Future API changes could alter what the helper exposes without a skill package update.

Why it was flagged

The API surface is intentionally tied to a live remote spec rather than a pinned client. This is disclosed and purpose-aligned, but it means routes may change outside the reviewed package.

Skill content
The CLI fetches the live OpenAPI spec from `/openapi.json` so the available routes, request bodies, and responses always reflect the deployed worker
Recommendation

Review the displayed route and payload before use, and prefer pinned API versions or explicit workflows for sensitive alarm changes.

What this means

The alarm-control token could remain available to future agent sessions longer than intended.

Why it was flagged

Putting a long-lived bearer token in CLAUDE.md makes the credential persistent agent context, where it may be reused or exposed across unrelated sessions or projects.

Skill content
paste it into your `CLAUDE.md` so future sessions auto-load it without re-pairing
Recommendation

Do not store the token in persistent instruction/context files; use a private environment variable or local untracked secret file and rotate/reset pairing when needed.

What this means

A user may trust the guidance and accidentally expose a credential that controls their alarms.

Why it was flagged

This reassurance underplays the risk of committing a long-lived secret that the same document says can read and rewrite alarms on the paired device.

Skill content
it is safe to commit the token ... You do not need a secrets manager
Recommendation

Revise the guidance to say the token is sensitive, should not be committed, and should be stored only in private local or managed-secret storage.