Skill
WarnAudited by ClawScan on May 10, 2026.
Overview
Aster is openly a powerful phone-control skill, but it gives an AI broad ability to read sensitive phone data and perform actions like texting, calling, UI automation, file changes, and event-triggered wakeups without clear per-action guardrails.
Install only if you intentionally want an AI agent to control an Android device. Prefer a spare phone, keep the server local or behind a trusted VPN, disable proactive callbacks unless needed, require confirmation before calls/SMS/file deletion/UI automation, and review the upstream npm package and APK before use.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If enabled broadly, an agent could send texts, place calls, tap through apps, or modify/delete accessible files.
The skill exposes tools that can mutate phone state, communicate externally, automate the UI, and change/delete files. The artifacts do not describe per-action approval or tight scoping for these high-impact operations.
`aster_send_sms` - Send an SMS text message ... `aster_make_call` - Initiate phone call ... `aster_write_file` ... `aster_delete_file` ... `aster_input_gesture` - Tap, swipe, long press
Use only with explicit human confirmation for calls, SMS, file deletion, app interactions, and other irreversible actions; prefer a spare device or restricted profile.
A malicious SMS, chat message, or notification could try to inject instructions into the agent’s context.
Notification or message text from the phone is packed into a field that the AI reads and can wake the agent immediately. The artifact does not describe treating that content as untrusted data.
Events are sent as HTTP POST ... The AI reads the `message` field ... `[data-text] Hey, are you free tonight?` ... `wakeMode`: `now`
Treat callback content as untrusted, delimit it clearly, filter event sources, and require confirmation before taking actions based on incoming notifications or messages.
Private notifications, message contents, device identifiers, and app metadata could be delivered to an agent endpoint, and an exposed webhook could be spoofed if not protected.
Sensitive phone event data can be sent to an agent webhook. The artifact says this is configurable, but does not show authentication, signature validation, filtering, or endpoint exposure limits for the webhook.
Aster can push real-time events from the phone to your AI agent via webhook ... Example ... `[device_id]` ... `[data-package]` ... `[data-title] John` ... `[data-text] Hey, are you free tonight?`
Keep callbacks disabled unless needed, use authenticated/private endpoints, restrict event types and apps, and avoid exposing the webhook publicly.
Photo/video metadata and search context may reveal locations, times, and personal media details to the agent.
The skill can index/search private media metadata, including potentially sensitive EXIF data. The artifact does not clearly bound paths, retention, exclusions, or reuse of indexed media context.
`aster_index_media_metadata` - Extract photo/video EXIF metadata ... `aster_search_media` - Search photos/videos with natural language queries
Limit media indexing to selected folders or a spare device, review retention settings, and avoid indexing sensitive personal media unless necessary.
The agent may see private messages, notifications, and location data from the connected phone.
These privileged Android data sources are disclosed and align with the device-control purpose, but they are highly sensitive and should be granted deliberately.
`aster_read_notifications` - Read notifications ... `aster_read_sms` - Read SMS messages ... `aster_get_location` - Get GPS location
Review Android permissions carefully, use the minimum needed permissions, and consider using a dedicated device rather than a primary personal phone.
You must trust the upstream npm package and Android release artifacts, not just this SKILL.md file.
The setup depends on an external global npm package and Android release APK. That is expected for this integration, but the provided skill artifact does not include the runnable code or a pinned install specification.
npm install -g aster-mcp aster start ... Install the Aster Android app ... from Releases
Inspect the upstream repository, pin versions where possible, verify release provenance, and install only from trusted sources.
