Macos Connectivity Restore

PassAudited by VirusTotal on May 3, 2026.

Overview

Type: OpenClaw Skill Name: macos-connectivity-restore Version: 0.1.0 This skill is designed to bypass MDM (Mobile Device Management) policies on macOS by modifying system-level preference files in `/Library/Managed Preferences`. It establishes persistence by installing a LaunchDaemon and a LaunchAgent via `scripts/install-startup.sh`, using `osascript` to prompt the user for administrator privileges. While the stated intent is to restore AirDrop and Universal Control functionality, the methods used to override organizational security controls and maintain root-level persistence are high-risk behaviors.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running this can override managed Mac restrictions and may conflict with device-owner, employer, school, or MDM policy.

Why it was flagged

The root script directly edits protected managed preference files to enable AirDrop and Universal Control.

Skill content
GLOBAL_ACCESS="/Library/Managed Preferences/com.apple.applicationaccess.plist" ... set_bool_key "${GLOBAL_ACCESS}" "allowAirDrop" true
Recommendation

Run only on a Mac you own or administer, and only if you are authorized to change managed AirDrop and Universal Control policy.

ConcernHigh Confidence
ASI10: Rogue Agents
What this means

The Mac may keep re-enabling these settings even after reboot or after another administrator tries to change them back.

Why it was flagged

The installer creates launchd jobs that run automatically after reboot/login and reapply the preference changes.

Skill content
<key>RunAtLoad</key>\n  <true/> ... launchctl bootstrap system "${ROOT_PLIST}"
Recommendation

Use the persistence option only with explicit approval, and provide or verify a clear removal process for the LaunchDaemon and LaunchAgent.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

A privileged installation flow that runs code from /tmp is more exposed to local tampering or race conditions than a safer, private temporary location.

Why it was flagged

The script writes an installer into a predictable /tmp path and then executes it with administrator privileges.

Skill content
ROOT_INSTALL_SH="/tmp/${ROOT_LABEL}.install.sh" ... osascript -e "do shell script \"/bin/zsh '${ROOT_INSTALL_SH}'\" with administrator privileges"
Recommendation

Review the script before approving the admin prompt; prefer a secure temporary directory or direct, integrity-controlled privileged install command.

What this means

Users may not realize from metadata alone that the skill is platform-specific and performs privileged local system changes.

Why it was flagged

The registry metadata under-declares that this is a macOS-only skill that uses system tools and privileged launchd installation.

Skill content
OS restriction: none; Required binaries: none; No install spec
Recommendation

Declare macOS-only operation and the required system tools/privileged behavior in metadata or installation notes.