tencent cvp skill
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill’s Android automation purpose is clear, but its app-install fallback encourages finding APKs from web search without provenance safeguards.
Review this skill carefully before installing. It is suitable only if you want the agent to control an Android device via ADB. Keep sensitive apps and information out of view unless needed, approve any account-impacting actions explicitly, and avoid the APK web-search fallback unless you can verify the source.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The agent can operate the Android phone much like a user, including typing into apps or opening links.
The skill documents direct ADB control for taps, text entry, key events, and launching URLs/apps. This is purpose-aligned for Android automation, but it can perform high-impact actions on the device.
adb shell input tap <x> <y> ... adb shell input text "hello" ... adb shell am start -a android.intent.action.VIEW -d "https://example.com"
Use it only on devices and apps you intend the agent to control, and require explicit user direction for sensitive actions such as purchases, account changes, messages, or financial activity.
The agent could help install an Android package from an unverified website, exposing the device to malicious or tampered apps.
The app-install workflow tells the agent to fall back to web searches for APK downloads, which may lead to untrusted app sources without verification or approval guidance.
Priority: MyApp (应用宝) first, then browser, then web search. ... Last resort: web search for APK download
Restrict installs to official app stores or verified vendor sites, require user approval before any install, and verify APK origin/signature before installation.
Actions performed in logged-in apps may affect the user’s real accounts.
The skill is intended to launch and operate apps that may already contain logged-in user sessions. No credential theft is shown, but ADB automation acts under the device user’s existing authority.
Common Package Names ... WeChat | com.tencent.mm ... Alipay | com.eg.android.AlipayGphone
Do not allow autonomous use inside account, messaging, payment, or financial apps unless the exact action has been approved.
Private messages, account details, or other visible screen content may be captured during use.
The skill reads UI text and may save screenshots locally for analysis. This is expected for screen automation but can expose private on-screen information to the agent context and local temporary files.
Structured XML with every element's text, coordinates, and properties ... adb shell screencap -p /sdcard/screen.png && adb pull /sdcard/screen.png /tmp/screen.png
Avoid using the skill while sensitive information is visible, and clean up temporary screenshots if they contain private data.
