Android Remote Control

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could see the phone screen and perform taps that trigger actions in apps, such as sending messages or confirming prompts, if the user directs or allows it.

Why it was flagged

The script exposes raw Android device operations: capture the screen, tap arbitrary coordinates, and start an arbitrary package. This is consistent with the remote-control purpose, but mistaken or over-broad use could act inside any open phone app.

Skill content
d.screenshot(output_path)
...
d.click(x, y)
...
d.app_start(pkg)
Recommendation

Use only with a trusted device that you can observe. Require explicit confirmation before taps that submit forms, send messages, make purchases, delete data, change settings, or install/uninstall apps.

What this means

If USB debugging is authorized, actions run as the device user context and can interact with apps that are already logged in on the phone.

Why it was flagged

The skill connects through ADB/uiautomator2, which uses the Android debugging trust relationship. That gives delegated device-level control to whichever connected device uiautomator2 selects.

Skill content
adb_path = r"C:\Program Files (x86)\Camo Studio\Adb"
...
d = u2.connect()
Recommendation

Only authorize ADB for trusted computers and sessions, disconnect the device or revoke USB debugging authorization after use, and avoid using this on a primary phone with sensitive apps open.

What this means

The skill may fail unless dependencies already exist, or users may install dependencies manually without the registry documenting exact versions or sources.

Why it was flagged

The script relies on the uiautomator2 Python package and a local ADB installation, while the provided install metadata declares no install spec or required binaries. This leaves dependency setup and provenance to the user.

Skill content
import uiautomator2 as u2
...
adb_path = r"C:\Program Files (x86)\Camo Studio\Adb"
Recommendation

Install uiautomator2 and ADB only from trusted sources, prefer pinned versions, and verify that the ADB path points to the intended binary.

What this means

Phone screenshots can contain private messages, notifications, account details, or one-time codes, and may be exposed to the model/provider used for visual analysis.

Why it was flagged

The documented workflow saves a phone screenshot and references using a vision model such as Qwen-VL to locate coordinates. If that model is remote, screen contents may be shared outside the local device.

Skill content
python scripts/remote_control.py snap workspace/last_snap.jpg
...
Qwen-VL
Recommendation

Avoid capturing sensitive screens, close private apps/notifications before use, and understand where any vision model processing occurs before sending screenshots for analysis.