Android SMS Gateway

PassAudited by ClawScan on May 10, 2026.

Overview

The skill appears to do what it claims—control an Android SMS gateway—but it can send bulk texts, read incoming SMS, use gateway credentials, and register webhooks, so it should be configured carefully.

Install only if you intend to let OpenClaw control an Android SMS gateway. Before use, protect the gateway token/password, keep the gateway on a trusted network, prefer local/private-server mode, verify every recipient list before sending, and use webhook forwarding only to trusted HTTPS endpoints.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent or user could send real SMS messages, including bulk messages, to selected recipients.

Why it was flagged

The skill intentionally supports sending SMS, including bulk sends from a recipient file. This is consistent with the stated purpose, but it can incur costs or contact many people if run without careful review.

Skill content
./scripts/bulk_sms.sh --recipients-file ./contacts.txt --message "Alert"
Recommendation

Use dry-run first for bulk sends, verify recipient lists and message text, and require explicit user approval before sending real SMS.

What this means

Anyone who obtains the gateway token or password may be able to send SMS or access gateway functions.

Why it was flagged

The integration needs SMS gateway credentials, either bearer tokens or basic-auth username/password. This is expected, but those credentials can control SMS sending and message access.

Skill content
"api_token": "your-api-token" ... "gateway_user": "your-username", "gateway_pass": "your-password"
Recommendation

Store credentials in a protected config file, avoid putting secrets in shell history or shared chats, restrict gateway network access, and rotate credentials if exposed.

What this means

Received SMS messages can be sent to an external webhook endpoint and may keep flowing there after registration.

Why it was flagged

The webhook feature forwards incoming SMS events to a user-specified URL. This is disclosed and useful, but incoming SMS may contain sensitive content such as one-time codes or private messages.

Skill content
Webhook URL must be publicly accessible ... For testing, use https://webhook.site ... Payload will be POSTed to your webhook URL.
Recommendation

Use only trusted HTTPS webhook endpoints, avoid third-party test endpoints for sensitive messages, authenticate/validate webhook receivers, and delete webhooks when no longer needed.

What this means

If cloud mode is used, SMS-related requests and credentials may go to the external sms-gate.app service rather than only a local phone.

Why it was flagged

The documentation emphasizes self-hosting and no third-party dependency, but it also supports an optional cloud API endpoint. The cloud mode is disclosed, but users should not assume all modes are fully local.

Skill content
Full control, no third-party dependencies ... export SMS_GATEWAY_URL="https://api.sms-gate.app/3rdparty/v1"  # Cloud
Recommendation

Use local or private-server mode for self-hosted operation, and review the provider’s security and privacy terms before using cloud mode.

What this means

Users have less provenance information for deciding whether the bundled scripts come from a trusted maintainer.

Why it was flagged

The provided artifacts include scripts, but registry provenance is limited and no homepage/source repository for the skill itself is declared.

Skill content
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.
Recommendation

Review the included scripts before use and obtain the Android gateway app only from the intended upstream project or a trusted release source.