Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

iResponder

v1.0.1

Monitor iMessage/SMS conversations and auto-respond based on configurable rules, AI prompts, and rate-limiting conditions. Use when you need to automatically reply to specific contacts with AI-generated responses based on conversation context. Also use when the user asks to manage auto-responder settings, contacts, prompts, or view status/history.

0· 2.4k·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The skill description is an iMessage auto-responder and the SKILL.md and README consistently require macOS, the imsg CLI, and an OpenAI API key; but the package metadata declares no required env vars or binaries. The included scripts also reference Anthropic API keys (in watcher-old) and assume the 'curl' binary and Node.js are available. The codebase therefore needs credentials and CLI tools that the registry metadata does not list — an incoherence that should be resolved.
!
Instruction Scope
Runtime instructions ask to grant Full Disk Access and to run a long-running watcher that reads/writes config and log files under ~/clawd and reads ~/.clawdbot for API keys. The watcher spawns 'imsg' and 'curl' and sends network requests to external LLM APIs. The Telegram handler executes manage.js via execSync with interpolated arguments (potential command injection risk when fed untrusted input). These actions go beyond simple local config edits and involve reading local account/state and exfiltrating content to external APIs.
Install Mechanism
There is no automated install spec (no remote downloads). The skill is distributed with local scripts and docs only, so nothing is being fetched/installed silently by the skill itself. That reduces supply-chain risk, but it also means the shipped scripts will be run directly on the host.
!
Credentials
The registry lists no required environment variables, yet the code looks for OPENAI_API_KEY (and watcher-old looks for ANTHROPIC_API_KEY) and reads ~/.clawdbot for API credentials. Telegram integration is present but no bot token or network credentials are declared. Requesting Full Disk Access/Message automation is proportionate to monitoring Messages.app, but undisclosed access to API keys and config files is not proportional and should be declared/justified.
Persistence & Privilege
The skill runs a background watcher, creates PID, log, and state files under ~/clawd and persists state across restarts (normal for a watcher). always: false (not force-included). It requires macOS permissions (Full Disk Access, Messages automation) which are high-privilege but consistent with the stated function — confirm you understand the implications of granting these macOS permissions.
What to consider before installing
Things to check before installing: - Source trust: the package 'homepage' is unknown. Prefer code from a trusted repo. Review the full script contents locally before running. - Declared vs actual requirements: the registry metadata lists no env vars, but the code requires an OpenAI API key (OPENAI_API_KEY) or will try to read keys from ~/.clawdbot; watcher-old also looks for an Anthropic key. Confirm which provider/key you must supply and that you are comfortable storing it in that location. - macOS permissions: the skill requires Full Disk Access and Messages automation. Granting Full Disk Access to Terminal/iTerm allows these scripts to read many local files — only proceed if you accept that access. - Network & data exfiltration: the watcher sends conversation context to external LLM APIs (api.openai.com and/or api.anthropic.com). If you have sensitive message content, do not enable this unless you accept sending it to those services. - Telegram integration & command injection risk: telegram-handler invokes shell commands via execSync with user-provided strings. If you connect a Telegram bot or allow remote users to trigger these handlers, ensure the bot is restricted to trusted chats and consider sanitizing inputs or avoiding Telegram integration entirely. - Operational safety: run in test mode first (scripts provide a test mode) and monitor logs at ~/clawd/logs/imsg-autoresponder.log. Consider running under a separate user account or on a non-primary machine to limit blast radius. Backup ~/.clawdbot and verify no unexpected keys are leaked. - Recommended actions before install: verify the imsg CLI origin (brew tap steipete/tap), audit the scripts for any additional network endpoints, and add the required environment variables explicitly to the skill metadata or your deployment notes so you know what secrets are needed and where they will be read from. If you want, I can point out the exact lines that read credentials, perform network calls, or use execSync so you can inspect them closely.

Like a lobster shell, security has layers — review code before you run it.

latestvk97arw62s94hm0s2fctst1p0p5802ben

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments