Back to skill
Skillv1.0.0

ClawScan security

Awesome GeeLark Skill · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousApr 29, 2026, 7:39 AM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill generally matches its stated purpose (GeeLark cloud-phone + RPA automation) but contains several inconsistencies and operational instructions that increase risk (missing declared credentials/binaries, runs local ADB subprocesses, asks to store tokens locally).
Guidance
What to consider before installing: - Functionality: The code and docs match the description: this is a GeeLark cloud-phone manager that can boot devices, enable ADB, run uiautomator2 automation, and submit RPA tasks that may include social-account credentials. That behavior is consistent with the stated purpose. - Inconsistencies to fix/verify: The registry metadata declares no required environment variables or required binaries, but the skill expects an API token/appId/apiKey stored in assets/config.json and uses the adb binary/uiautomator2. Confirm that you will provide and protect those credentials and ensure adb is available/expected on the host. - Sensitive data: init_config.py creates assets/config.json containing API keys/tokens. Review init_config.py to confirm where/how credentials are stored and that file permissions/ignore rules are acceptable. RPA tasks may require social platform usernames/passwords — avoid feeding long-lived account credentials to any agent unless you fully trust the code and runtime environment. - Local command execution: The skill runs adb via subprocess (including a required 'glogin' step) and instructs pip installing uiautomator2 with --break-system-packages. Run this in an isolated/sandbox environment (VM/container) first and verify behavior; do not run on sensitive hosts. - Trust and provenance: Source/homepage is unknown in the registry entry. Although the docs reference openapi.geelark.com and a GitHub URL, verify the repository and the authorship before use (confirm the repository matches package files and the API base URL). If you cannot verify the origin, be cautious. - Recommended actions before use: (1) Inspect scripts/init_config.py, geelark_client.py, and any logging code to see exactly what data is stored/transmitted; (2) run the skill in a sandboxed VM; (3) avoid giving the agent unattended autonomous invocation until you confirm safe behavior; (4) only provide short-lived API keys or limited-scope credentials when possible; (5) ensure logs do not leak full secrets and review log-masking behavior. If you want, I can: point out where credentials are loaded in the code, summarize the exact subprocess calls that run adb/glogin, or suggest concrete sandboxing steps to test safely.

Review Dimensions

Purpose & Capability
noteName/description, docs, and code files align: the package is a GeeLark Cloud Phone client + helpers for booting devices, ADB/uiautomator2 automation, and RPA tasks for social platforms. However the registry metadata declares no required credentials or binaries even though the code/docs expect an API token/appId/apiKey (assets/config.json) and use local adb/uiautomator2. The missing declarations are an incoherence worth noting.
Instruction Scope
concernSKILL.md instructs the agent/operator to run scripts/init_config.py (creates assets/config.json containing API credentials), to pip-install uiautomator2, and to execute ADB commands via subprocess (including a 'glogin' step) and use uiautomator2 to dump UI hierarchies and perform taps/inputs. It also shows RPA tasks that include third-party account credentials (social platform usernames/passwords) and file paths. These instructions access and store sensitive credentials and run local system commands — beyond simple REST API calls — increasing attack surface and risk of accidental credential exposure or abuse. The SKILL.md also auto-loads credentials from a file not declared in the registry metadata.
Install Mechanism
noteThere is no formal install spec in the registry. The documentation tells users to pip install uiautomator2 (with --break-system-packages). That is a normal Python dependency for device automation but may require native system changes; using --break-system-packages can be intrusive. No downloads from external personal servers are present in the manifest. Overall install risk is moderate and centered on the uiautomator2 requirement and local ADB usage.
Credentials
concernThe skill expects API credentials (token, appId, apiKey) stored in assets/config.json and will log operations locally; it also accepts RPA payloads containing third-party account credentials and proxy information. Yet the registry entry lists no required env vars or required binaries (e.g., adb) — an inconsistency. Requesting or storing multiple credentials (GeeLark API keys plus social account passwords and proxy credentials) is proportionate to the functionality but must be declared clearly and handled cautiously; the current packaging omits that declaration and thus looks under-specified and risky.
Persistence & Privilege
noteThe skill is not marked always:true and does not request elevated system privileges. It writes assets/config.json and logs to logs/cloudphone/ (normal for a client). However, default platform behavior allows autonomous invocation; combined with this skill's access to API tokens and potential to run local adb/subprocess commands, autonomous operation increases blast radius — test in a controlled environment and consider restricting autonomous runs until validated.