Mobile App Analytics
AdvisoryAudited by Static analysis on Apr 30, 2026.
Overview
No suspicious patterns detected.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If you provide platform credentials, the agent may be able to read analytics and app performance data from your Firebase, Apple, or Google accounts.
The skill may use credentials for third-party analytics accounts. This is expected for the stated purpose and is disclosed, but those accounts can contain sensitive business analytics data.
Queries Firebase, App Store Connect, and Play Console when you provide credentials
Use least-privilege, read-only/reporting credentials where possible, and avoid pasting secrets into local memory files or conversation history unless necessary.
Future sessions may reuse stored app context, goals, and preferences, which could influence later analysis or reveal business strategy if the files are shared.
The skill intentionally persists business/app context and activation preferences for future use. The storage is disclosed and scoped, but the retained data may still be sensitive.
Create `~/mobile-app-analytics/memory.md` with: - App name and platforms - Analytics tools they use - Key metrics they care about - Current goals or concerns - When to activate
Periodically review or delete files under ~/mobile-app-analytics/, keep secrets and PII out of them, and correct outdated metrics or goals.
