iCloud

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: icloud Version: 1.0.0 This skill bundle is designed with strong security and privacy principles. It explicitly instructs the agent to never request credentials in chat, use local prompts for authentication, require explicit user confirmation for risky actions (e.g., file deletion, Find My actions), and never persist secrets. All external network calls are to legitimate Apple iCloud endpoints or PyPI for dependency installation. File system operations are limited to creating a dedicated `~/icloud/` directory for operational notes, with appropriate permissions, and explicitly state that secrets should not be stored there. There is no evidence of data exfiltration, malicious execution, persistence mechanisms, or prompt injection attempts designed to subvert the agent's intended secure operation.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent can access iCloud data and services after the user authenticates locally.

Why it was flagged

The skill uses local Apple ID credentials to create an iCloud API session. This is expected for the stated purpose and avoids chat-based credential collection, but it grants sensitive account-level access.

Skill content
user = input("Apple ID: ").strip()
pwd = getpass.getpass("Apple password: ")
api = PyiCloudService(user, pwd)
Recommendation

Only use this with your own Apple account, never paste credentials into chat, and confirm the exact iCloud areas and devices the agent may access.

What this means

If approved, the agent could change iCloud Drive content or trigger Find My actions on a device.

Why it was flagged

The skill documents actions that can affect devices or cloud files, but it also requires user confirmation and scoped targets before those actions.

Skill content
Treat lost mode, message push, file rename/delete, and bulk upload as risky. Before running risky actions, summarize target, effect, and rollback option, then request explicit confirmation.
Recommendation

Before approving any risky action, check the exact device ID or file path, the expected effect, and the rollback plan.

What this means

Installing the dependency runs and uses third-party package code on the user's machine.

Why it was flagged

The skill relies on a third-party PyPI package. The dependency is pinned and disclosed, but it is still part of the trust boundary.

Skill content
python3 -m pip install --user pyicloud==2.4.1
Recommendation

Install only if you trust the pyicloud package and prefer using a dedicated Python environment if you want stronger isolation.

What this means

Local notes could reveal device names, iCloud Drive paths, or previous account operations to anyone with access to the machine.

Why it was flagged

The skill can persist local operational context such as device mappings, verified paths, and operation logs. It says not to store secrets, but the retained context may still be sensitive.

Skill content
Memory lives in `~/icloud/`... operations-log.md... device-map.md... drive-map.md... safety-events.md
Recommendation

Use session-only mode if you do not want persistence, and review or delete ~/icloud/ if you stop using the skill.