App Store

PassAudited by ClawScan on May 1, 2026.

Overview

This is a coherent app-publishing guide, but it discusses powerful store credentials and release automation that users should handle carefully.

Installers should treat this as a publishing playbook: review any automation before use, keep App Store and Play Console credentials in secret managers, restrict production-release permissions, and require a human approval step before public releases.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If copied into a real CI/CD setup with valid credentials, this could publish an app release without an additional App Store manual release step.

Why it was flagged

The documentation shows a release automation example that can submit and automatically release an app, which is high-impact but directly aligned with the skill's app-store publishing purpose.

Skill content
upload_to_app_store(
    submit_for_review: true,
    automatic_release: true
  )
Recommendation

Use manual approvals, staged rollout/phased release, and separate beta versus production lanes before enabling automatic production release.

What this means

Mismanaged credentials could allow unauthorized app uploads, track changes, or release-management actions in Apple or Google developer accounts.

Why it was flagged

The skill describes Apple App Store Connect API keys and a Google Play service account scope that can perform developer-console actions; this is expected for publishing but grants meaningful account authority.

Skill content
Download .p8 file (only downloadable once) ... scopes=['https://www.googleapis.com/auth/androidpublisher']
Recommendation

Use least-privilege roles, keep keys in CI secret stores, avoid committing credential files, rotate keys periodically, and separate build/upload permissions from production-release permissions.