LG ThinQ

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: lg-thinq Version: 1.0.0 The skill is designed to control LG ThinQ appliances and generally appears benign, using standard configuration practices and a legitimate third-party library. However, the `scripts/thinq.py` file includes a `raw` command-line argument that allows sending arbitrary JSON payloads to the device control API. While not explicitly used for malicious purposes within the provided files, this capability (`thinq.py raw <device> <json>`) provides an unconstrained interface for device control, which could be exploited by a compromised agent or a malicious prompt to perform actions beyond the skill's stated high-level functions.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent or user could send broader appliance-control requests than the skill description suggests, potentially changing physical device behavior without the same guardrails as the documented commands.

Why it was flagged

The script exposes a generic raw device-control command that can pass arbitrary payloads to the ThinQ control API, while SKILL.md documents only specific temperature and mode commands.

Skill content
print("  raw <device> <json>  Send raw command") ... return await api.async_post_device_control(device_id, payload)
Recommendation

Remove the raw command, or require explicit user confirmation plus allowlisted schemas, model-specific validation, and clear documentation before any raw control request is sent.

What this means

Anyone or any process that can read this token file may be able to access or control the linked LG appliances through the API.

Why it was flagged

The skill requires a ThinQ Personal Access Token stored in a local file, which is expected for the service but grants access to the user's appliance account.

Skill content
Get a Personal Access Token from https://connect-pat.lgthinq.com ... Store token: `echo "YOUR_TOKEN" > ~/.config/lg-thinq/token`
Recommendation

Use a least-privileged token if LG supports it, restrict file permissions, and revoke the token if the device or account is no longer used.

What this means

Installing an unpinned dependency can introduce supply-chain risk if the package source or version is not verified.

Why it was flagged

The runtime depends on an external Python package, but the artifact has no install spec or version pin; the install is user-directed rather than automatic.

Skill content
from thinqconnect.thinq_api import ThinQApi ... print("❌ thinqconnect not installed. Run: pip install thinqconnect")
Recommendation

Document the dependency in an install spec, pin a known-good version, and install only from a trusted package source.

What this means

The cache may reveal private information about the user's home appliances to local users or processes with file access.

Why it was flagged

The skill caches the user's appliance list locally, including device identifiers and metadata.

Skill content
DEVICES_CACHE = CONFIG_DIR / "devices.json" ... DEVICES_CACHE.write_text(json.dumps(devices, indent=2))
Recommendation

Store the cache with restrictive permissions, avoid sharing it, and delete it when no longer needed.