Health Guardian

v1.0.0

Proactive health monitoring for AI agents. Apple Health integration, pattern detection, anomaly alerts. Built for agents caring for humans with chronic conditions.

2· 1.9k·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The stated purpose (import Apple Health exports, detect patterns, send alerts) matches the general behavior of the included scripts, but there are multiple mismatches: the SKILL.md and config.example refer to a 'Health Auto Export' iCloud folder and files like readings.json/baselines.json/alerts.json, while scripts.import_health.py looks in a different hard-coded path (iCloud~com~ifunography~HealthExport/Documents and an AutoSync subfolder) and writes to data/vitals.json. scripts/analyze.py expects data/readings.json. These inconsistencies mean the components are not coherently wired together.
!
Instruction Scope
SKILL.md instructs the user to create config.json (including data_source and alert_channel) and claims 'Nothing leaves your machine' and proactive alerting to channels such as Telegram. However, import_health.py ignores config.json (it uses hard-coded HEALTH_EXPORT_PATH and AUTOSYNC_PATH) and there is no code that sends alerts to external services (alerts are printed by analyze.py). The SKILL.md also documents storage files (readings.json, baselines.json, alerts.json, patterns.json) but the importer writes vitals.json. Reading iCloud-exported files and writing to /tmp and ./data is within scope, but the mismatch between documentation and code is a significant scope/integration problem.
Install Mechanism
No install spec and no network downloads; the skill is instruction-plus-local Python scripts. Nothing in the repository pulls arbitrary external code during install.
Credentials
The skill declares no required environment variables or credentials. The scripts only read local filesystem paths (iCloud export locations and a local data/ directory). That filesystem access is expected for this purpose, but the hard-coded iCloud paths should be reviewed to ensure they only point at the intended exports.
Persistence & Privilege
The skill does not request elevated or persistent platform privileges (always:false). It writes only to its own data directory and /tmp. It does not modify other skills or global agent configuration.
What to consider before installing
This skill appears to be a genuine health-import-and-analysis tool, but it contains multiple engineering mismatches that prevent it from working as advertised and raise risk if you install blindly. Key points to consider before installing or running: - Do not assume the SKILL.md is accurate: config.json settings (data_source, data_dir, alert_channel) are not used by import_health.py. The importer uses hard-coded HEALTH_EXPORT_PATH and AUTOSYNC_PATH. Verify and update the importer to respect your configured path or change the config to match what the script expects. - File-name mismatch: import_health.py writes data/vitals.json while analyze.py expects data/readings.json. Either change the importer to write readings.json or change analyze.py to read vitals.json. Until you fix that, the pipeline won't produce the alerts/summary the README promises. - Alert delivery is not implemented: SKILL.md mentions Telegram and 'alerts' in agent heartbeat, but the code only prints alerts to stdout. If you need outbound notifications, you must implement a safe, explicit delivery step (and separately provide credentials). Do not add credentials until you review the sending code. - Verify the export source: SKILL.md recommends Health Auto Export (ifunography vs other vendors). The importer targets an 'iCloud~com~ifunography~HealthExport' path and an AutoSync folder structure. Ensure your phone/export tool actually writes there; otherwise update the paths. - Privacy claim: the code reads local iCloud-synced files and writes local JSON. There are no network calls in the provided scripts, so 'Nothing leaves your machine' appears true for the provided code — but only if you do not modify it (e.g., to add notification sending) or grant the agent other outbound permissions. Review any changes that add networking. - Run in a sandbox first: run the scripts against a copy of your exports (or synthetic data) in an isolated environment to confirm behavior, file writes, and that no unexpected files are read. - Code audit suggestions: make the importer read config.json for paths and output filenames; add explicit path whitelisting; align filenames and data schema between importer and analyzer; add unit tests for parsing; and ensure safe error handling. Given multiple incoherencies (paths, filenames, absent alerting), classify this skill as suspicious rather than benign. If you want to use it, fix and re-audit the code or ask the publisher for a corrected release.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ftmnb87kv0ssev3ecess4b980j207

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments