Clawshorts Pkg
Analysis
The skill mostly matches its stated purpose, but it installs a persistent Fire TV control daemon and includes an unsafe helper validation path that could execute unintended local code if given a malicious IP string.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
python3 -c "... ip = '$ip' ... if not re.match(..., ip): ..."
The helper validates an IP address by interpolating the raw shell variable into executable Python code before validation. A crafted value containing a quote could break out of the string if this helper is invoked directly with untrusted input.
<key>RunAtLoad</key> <true/> ... <key>KeepAlive</key> <true/> ... systemctl --user enable --now clawshorts.service
The install command creates a launchd or systemd user service that starts automatically and keeps the daemon running.
adb -s "$ip:5555" shell am force-stop "$YOUTUBE_PKG"
The daemon uses ADB shell commands to force-stop the YouTube app when the configured limit is reached.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
ADB lets your computer control your Fire TV. Only enable this on a trusted home network.
The skill requires ADB debugging, which grants the computer control authority over the Fire TV.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`~/.clawshorts/clawshorts.db` — your watch history ... `~/.clawshorts/ui-<IP>.xml` — Last UI hierarchy dump
The skill stores persistent local usage history and a last UI hierarchy dump from the Fire TV.
