Yyds.Auto
Analysis
Yyds.Auto is openly an Android automation skill, but it gives an agent broad control over a phone, including elevated shell commands, app/file changes, Python execution, and remote device control.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Shell | 1 | Execute shell commands with ROOT/SHELL privileges ... File Operations | 7 | List, read, write, delete, rename files and directories on device ... App Management | 8 | ... install/uninstall APK
The skill exposes broad, high-impact device mutation tools, including privileged shell, file deletion/writes, and APK installation/removal, with no visible confirmation or containment model.
Script Projects | 5 | List/start/stop Python projects, execute Python code snippets ... Pip Management | 4 | List, install, uninstall, inspect Python packages
The documented tools allow executing Python snippets and changing installed Python packages on the Android-side environment.
AI Agent | 8 | Configure and run an on-device AI agent with natural language instructions ... Script Projects | 5 | List/start/stop Python projects
The skill can start on-device agents and Python projects, but the visible artifacts do not define stop conditions, runtime limits, or containment for those autonomous activities.
Source: unknown ... Install specifications: node | package: yyds-auto-mcp | creates binaries: yyds-auto-mcp
The reviewed artifacts do not include the npm package implementation, so the executable code that performs device control is outside the provided artifact set.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Device Info | 4 | Device model, screen size, IMEI, foreground app, network status ... Execute shell commands with ROOT/SHELL privileges
The skill can access device identity/app-state information and operate with shell or root-level authority, which is a significant permission boundary for an Android device.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
yyds-auto-mcp (Node.js, this skill) ↓ HTTP REST (JSON, port 61140) ... Remote devices over WiFi/LAN are also supported.
The artifacts describe a high-impact MCP-to-device bridge over an HTTP REST host/port and LAN support, but do not document authentication, authorization, or network-boundary protections.
