imsgctl
Analysis
Review before installing: the skill is read-only and transparent, but it can expose private Apple Messages history, attachments, and live activity through an external CLI that may require Full Disk Access.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
brew | formula: jpreagan/tap/imsgctl | creates binaries: imsgctl
The skill depends on an external Homebrew tap binary, while the provided artifacts contain no implementation for the reviewer to inspect.
Use `watch` only for live monitoring. It streams until interrupted.
The live monitoring command can continue reading new message activity until it is stopped.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Direct access to `~/Library/Messages/chat.db` requires macOS and Full Disk Access for the process doing the reading.
Full Disk Access is a broad local permission, and the skill is intended to use it to read a protected Apple Messages database.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Use `imsgctl` to read Apple Messages data available on the current machine.
Message history, chat identifiers, and attachment metadata can be returned to the agent in machine-readable form and become part of the working context.
