Fellow Aiden Precision Coffee Maker

v1.0.1

Control your Fellow Aiden smart coffee brewer via AI assistant. Manage brew profiles, view brewer status, create and tweak recipes, add shared brew links, an...

0· 445·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description match the code: controlling a Fellow Aiden brewer legitimately requires account credentials and network access. However, the script calls a non-official API gateway (BASE_URL points to an execute-api.us-west-2.amazonaws.com host) rather than a clear Fellow-owned API domain; that is unexpected and worth verifying.
Instruction Scope
SKILL.md instructs the agent to run the included Python script and to set FELLOW_EMAIL and FELLOW_PASSWORD — the runtime behavior in fellow.py matches those instructions and does not attempt to read other local files or extra environment variables.
Install Mechanism
Registry metadata lists this as instruction-only (no install spec), but SKILL.md contains an install entry (pip3 install fellow-aiden) and requirements.txt references fellow-aiden. The included fellow.py does not import the fellow-aiden package and uses requests directly. This mismatch is confusing (missing requests dependency in requirements.txt, redundant library reference) but not obviously malicious.
Credentials
The skill only requests FELLOW_EMAIL and FELLOW_PASSWORD, which is proportionate for a skill that must authenticate to a user account. The risk stems from where those credentials are sent: the code posts them to the BASE_URL API gateway, which is not clearly tied to FellowProducts — raising a credential-leakage concern.
Persistence & Privilege
The skill does not request persistent or elevated privileges (always:false, no config paths modified, no system-wide changes). It will run on demand and does not declare any special persistent abilities.
What to consider before installing
This skill appears to implement the advertised features, but before installing you should verify the code and endpoint provenance: 1) Confirm the GitHub/homepage and author (SKILL.md references https://github.com/9b/fellow-aiden) actually host the same code and that the execute-api URL is intentional. 2) Treat the FELLOW_PASSWORD as sensitive — avoid supplying your main account password until you're confident the endpoint belongs to Fellow or a trusted maintainer. Prefer using a dedicated account or API token if possible. 3) Ask the author/maintainer why the script calls an execute-api.amazonaws.com host (is it a proxy, personal dev server, or official endpoint?). 4) If you proceed, review the network calls (e.g., inspect TLS cert ownership or run in an isolated environment) and consider adding the missing dependency declarations (requests) if you install locally. If you cannot verify the endpoint owner, do not supply real credentials.

Like a lobster shell, security has layers — review code before you run it.

latestvk97eh5qdk5c7mqajtdvnma9k4x81nzn6

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Clawdis
Binspython3
EnvFELLOW_EMAIL, FELLOW_PASSWORD
Primary envFELLOW_EMAIL

Comments