Droidrun Agent
Analysis
This skill is not clearly malicious, but it gives an agent broad Android device-control powers, including screenshots, text input, app launching/stopping, and APK installation, so it should be reviewed carefully before use.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Supports all action methods ... (`tap`, `swipe`, `global_action`, `start_app`, `stop_app`, `input_text`, `clear_input`, `press_key`, `set_overlay_offset`, `set_socket_port`, `take_screenshot`) ... `install(urls: list[str], hide_overlay: bool = True)` ... Install APK(s) from URL(s)
These methods allow broad remote operation of an Android device and installation of APKs from supplied URLs. The artifact does not describe approval prompts, device scoping, source allowlists, or rollback controls for these high-impact actions.
Source: unknown; Homepage: none ... No code files present — this is an instruction-only skill.
The reviewed artifacts do not include the implementation for the documented Python clients or MCP server, so the clean static scan does not validate the actual code that would perform device-control actions.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Communicates with Portal's HTTP server ... using Bearer token authentication ... token="YOUR_TOKEN"
The token is expected for DroidRun Portal access, but it is a privileged credential because it authorizes device-control operations.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Provides ... a built-in MCP server for communicating with Android devices running DroidRun Portal.
MCP support is purpose-aligned, but the artifact does not describe the MCP server's authentication, client restrictions, or data boundaries while it exposes sensitive device interaction capabilities.
