App Store Connect
PassAudited by VirusTotal on May 12, 2026.
Overview
Type: OpenClaw Skill Name: app-store-connect Version: 1.0.0 This skill bundle is designed to manage iOS/macOS apps via the App Store Connect API. All files consistently demonstrate a clear, legitimate purpose. Credentials (private keys, issuer IDs, key IDs) are handled securely by requiring them as environment variables and explicitly stating that private keys are never transmitted. All network requests are directed exclusively to the official `api.appstoreconnect.apple.com` endpoint, as confirmed by `SKILL.md` and all `curl` examples in `api-auth.md` and `workflows.md`. There is no evidence of data exfiltration to unauthorized endpoints, malicious code execution, persistence mechanisms, or prompt injection attempts against the agent. A minor typo (`application/a]gzip`) in `workflows.md` is a benign bug, not indicative of malice.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If used with real credentials and IDs, the agent could submit builds, update app metadata, add testers, create apps, or change release settings.
The workflow documents a mutating API call that can submit an app version for review. This is aligned with the skill purpose, but it is a high-impact action.
curl -X POST ... "https://api.appstoreconnect.apple.com/v1/appStoreVersionSubmissions"
Require explicit user confirmation before any upload, POST, PATCH, submission, tester invitation, app creation, or release-management action.
A broadly scoped API key could let the agent make important changes across an Apple developer team account.
The skill requires App Store Connect API credentials that may carry broad developer-account privileges. The documentation does recommend minimal permissions.
Apple Developer Account with Admin or App Manager role ... Admin for full access, App Manager for app-specific
Use an App Manager or app-specific key where possible, avoid Admin unless required, protect the .p8 private key, and rotate keys periodically.
Users could misunderstand that bearer tokens are never transmitted, even though they must be sent to Apple’s API for authentication.
JWTs are generated locally, but the same document shows them being sent to Apple in Authorization headers. This appears to be an imprecise privacy statement rather than hidden exfiltration.
Data that stays local: ... JWT tokens - generated locally
Clarify that the private key stays local, while short-lived JWT bearer tokens are sent only to Apple App Store Connect endpoints.
