Apple Serial Lookup
PassAudited by ClawScan on May 1, 2026.
Overview
This appears to be a straightforward Apple serial lookup skill, with the main privacy consideration that serial numbers may be sent to web search or third-party lookup sites.
This skill looks benign for Apple serial decoding. Before installing, be aware that web-enhanced lookups can disclose the device serial number to external sites, and the package has no homepage or known source listed.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Users have less external provenance to verify who maintains the skill or where updates come from.
The skill has limited provenance metadata. This is not a concern by itself because the included code is visible and simple, but users should notice the lack of an upstream source.
Source: unknown Homepage: none No install spec — this is an instruction-only skill.
Review the included files before installing and prefer versions with a clear source or maintainer history when available.
Installing the skill enables a local command to be run for serial decoding.
The skill directs the agent to run a local bundled Python script. This is purpose-aligned for local decoding, and the provided script only parses input and prints JSON.
Run the bundled decoder script: ```bash python3 scripts/decode_serial.py <SERIAL> ```
Run it with normal user privileges and provide only Apple-style alphanumeric serial numbers as input.
A device serial number may be logged or processed by external providers during lookup.
The workflow may send the full device serial number to search engines or third-party lookup sites.
web_search for "Apple serial number <SERIAL> specs" ... web_fetch from `https://everymac.com/ultimate-mac-lookup/?search_keywords=<SERIAL>`
Use web lookup only when comfortable sharing the serial externally; for warranty details, prefer Apple’s official coverage page as the skill suggests.
