Mobilerun
Analysis
Mobilerun appears purpose-aligned for phone automation, but it grants very broad control over a connected Android device and sensitive apps, so it should be reviewed carefully before use.
Findings (7)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
"If a device is ready, go straight to executing the user's request" ... "Only ask the user when something is genuinely ambiguous."
The skill tells the agent to proceed without routine confirmation once a device is ready, which is risky for a tool that can control real apps and accounts.
- **Social Media:** "Post a photo on Instagram" ... - **Messaging:** "Read my WhatsApp messages", "Send a message on Telegram to Mom" ... - **Data:** ... "Open my banking app and check my balance"
The documented examples include private message access, public social actions, direct messaging, and banking-app use, all of which are high-impact phone/account actions.
POST /devices/{deviceId}/shell
{"command": "am start -a android.intent.action.MAIN -n com.android.vending/.AssetBrowserActivity"}The documentation exposes a raw Android shell-command endpoint; even though the example is for launching the Play Store, the endpoint is a broad escape hatch.
Always terminate cloud devices (`DELETE /devices/{deviceId}`) when you're done using them ... This applies whether you provisioned the device yourself or finished a task on an existing cloud deviceThe skill instructs the agent to delete/terminate cloud devices as cleanup, including devices it did not necessarily create in the current task.
The Portal app is distributed as an APK from GitHub Releases ... installed outside the Play Store
The required phone-side app is sideloaded from GitHub rather than installed through the Play Store; this is disclosed and expected for this setup.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
`MOBILERUN_API_KEY` ... used solely for authenticating API requests ... requires the **Accessibility Service** permission ... Read the UI element tree ... Simulate taps, swipes, and text input
The skill uses a bearer API key plus Android Accessibility permission to access and control connected devices; this is disclosed and central to the purpose, but highly privileged.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
**Screenshots and UI tree data** may contain personal information visible on the user's screen (messages, emails, photos, etc.).
The skill intentionally retrieves screen and UI context that may include sensitive personal content; the artifacts disclose this and say it is fetched on demand.
