Clawtunes Play
PassAudited by VirusTotal on Apr 5, 2026.
Findings (1)
The skill utilizes high-risk capabilities including UI automation via `osascript` and `System Events` to inject keystrokes (e.g., Tab, Enter, Cmd+L) into the macOS Music app, which requires Accessibility permissions. It also performs network requests to the iTunes API (`itunes.apple.com`) and executes shell commands via `subprocess` to interact with the `clawtunes` CLI. While these actions are aligned with the stated purpose of automating Apple Music playback and catalog navigation, the use of keystroke simulation and shell execution represents a significant privilege level and attack surface. Key files: `catalog_play.py`, `playlist_create.py`, and `SKILL.md`.
