Bluetooth

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If approved too broadly, an agent could send commands to speakers, wearables, lights, locks, or other nearby devices.

Why it was flagged

The skill documents commands that can pair, connect to, and write data to Bluetooth devices. This is central to the skill, but misuse could change device behavior.

Skill content
pair XX:XX:XX:XX:XX:XX      # Pair device
connect XX:XX:XX:XX:XX:XX   # Connect
char-write-cmd 0x0025 0100
Recommendation

Only allow pairing, connection, and write operations for devices you recognize and for actions you explicitly requested.

What this means

Running these commands may expose nearby device traffic in capture files and requires elevated system privileges.

Why it was flagged

The packet-capture workflow requires root privileges and can record Bluetooth traffic. This is a legitimate diagnostic workflow, but it crosses a local privilege boundary.

Skill content
sudo btmon

# Save to file
sudo btmon -w capture.btsnoop
Recommendation

Use sudo packet capture only for troubleshooting, save captures in a known location, and avoid sharing them unless necessary.

What this means

Installing external packages can introduce normal package-manager supply-chain risk.

Why it was flagged

The skill references optional third-party tools/packages without pinning versions. These are user-directed setup commands and align with the Bluetooth purpose.

Skill content
brew install blueutil
...
pip install bleak
Recommendation

Install only from trusted package managers, verify package names, and prefer maintained/pinned versions where possible.

What this means

Local profile/history files could reveal device MACs, device names, usage patterns, command results, and possibly health or pairing information if someone reads them.

Why it was flagged

The skill creates persistent local memory about Bluetooth devices and interactions, and may store sensitive identifiers or pairing details.

Skill content
Store approved devices in `~/bluetooth/profiles/`
...
Log every command sent and result received
Retain logs for troubleshooting and audit
...
Document PIN/passkey in profile (if static)
Recommendation

Review and protect the ~/bluetooth/ folder, avoid storing secrets unless necessary, prune old logs, and verify learned profiles before reusing saved commands.