Smart Home
PassAudited by ClawScan on May 1, 2026.
Overview
This is an instruction-only smart-home guide with no code, install steps, credentials, or hidden data flows, though some advice affects locks, alarms, routers, and device resets.
This skill appears safe to install as documentation. Before applying its advice, carefully review any changes involving locks, alarms, cameras, routers, WiFi passwords, factory resets, or water valves, and keep manual recovery options available.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If a user implements these automations without testing or manual overrides, a false trigger or misconfiguration could affect home access, safety, or utilities.
The automation examples can cascade from one trigger into multiple physical actions, including changing lock state and shutting off a water valve. This is purpose-aligned smart-home guidance, but safety-sensitive.
Water leak detected | Shut off main valve (if smart), immediate notification ... Smoke detector | All lights on 100%, unlock doors
Treat these as design patterns, not defaults. Test automations, keep manual overrides and physical keys, and require explicit confirmation for safety-critical devices where possible.
Following these steps without confirming ownership, backups, or household coordination could lock people out, disconnect devices, or remove existing device history/settings.
The takeover checklist recommends high-impact configuration changes and device resets. These are appropriate for securing inherited smart-home devices, but they can disrupt access or erase configurations if done on the wrong devices.
Change WiFi password ... Factory reset every smart device before reconfiguring ... Change codes on all smart locks immediately
Confirm ownership and authorization before resetting devices, back up needed settings or recordings, coordinate with household members, and keep fallback access methods.
