Claw Use — Device Control for AI Agents
Control physical devices over HTTP with unified commands for screen reading, input actions, app launch, navigation, and audio output using the Claw Use proto...
MIT-0 · Free to use, modify, and redistribute. No attribution required.
⭐ 0 · 21 · 0 current installs · 0 all-time installs
by傅洋@4ier
MIT-0
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The SKILL.md describes a coherent device-control protocol (HTTP API, cu CLI, endpoints for screen, tap, screenshot, TTS, etc.), which matches the skill name and description. However, the doc requires token-based auth (X-Bridge-Token) yet the registry metadata declares no required credentials or primaryEnv. That omission is notable: a real integration would usually declare how tokens are supplied.
Instruction Scope
Runtime instructions permit reading UI trees, screenshots, notifications, and performing input/launch actions — all expected for device control but high-impact. SKILL.md also contains a contradiction: Device State says 'unlock (PIN required for unlock)' but Tips state 'Auto-unlock is transparent: locked devices auto-unlock before any command.' That discrepancy affects security assumptions (automatic unlocking vs requiring PIN). The instructions do not limit or describe how sensitive data (screenshots, notifications) should be handled or transmitted.
Install Mechanism
This is instruction-only with no install spec or bundled code, which is low-risk from a supply chain perspective. The skill expects the 'cu' CLI to be installed but doesn't provide an install mechanism — acceptable but the absence of an official install source or guidance in metadata reduces transparency.
Credentials
The protocol requires token auth via X-Bridge-Token per the docs, but the registry metadata lists no required environment variables or primary credential. The skill also suggests optional Tailscale use for remote access (which would require separate credentials/config). Requesting no declared credentials while describing token-based auth is inconsistent and leaves unclear how secrets are expected to be supplied or stored.
Persistence & Privilege
always:false (no forced persistence). The skill can be invoked autonomously by the agent (platform default). Given this skill allows remote control of physical devices (taps, unlocks, app launches, screenshots), autonomous invocation increases risk; consider restricting autonomous use or requiring explicit user approval for commands that affect devices or capture content.
What to consider before installing
This skill appears to be a genuine device-control protocol, but a few gaps warrant caution. Before installing or enabling it: 1) Confirm how authentication tokens are provided and stored — the skill mentions X-Bridge-Token but declares no required credentials; avoid giving long-lived tokens unless you trust the implementation. 2) Clarify the unlock behavior — does the agent really auto-unlock devices, and under what conditions? Auto-unlock can let the agent access locked device contents. 3) Restrict autonomous invocation or require explicit user confirmation for sensitive actions (screenshots, reading notifications, unlocking, sending intents). 4) Only use implementations you trust (verify the cu CLI source or the device-side implementation), run device control on isolated networks when possible, and avoid exposing control ports to the public internet. 5) If the publisher can provide updated metadata (declared required credentials, install instructions, and a security/privacy page), that would reduce uncertainty and could change this assessment to benign.Like a lobster shell, security has layers — review code before you run it.
Current versionv1.0.0
Download ziplatest
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
SKILL.md
Claw Use — Device Control for AI Agents
Give your AI agent eyes, hands, and a voice on real devices.
Claw Use is a protocol + skill for AI agents to control physical devices over HTTP. The cu CLI provides a unified interface — the same commands work across any device that implements the Claw Use API.
Supported Devices
| Platform | Implementation | Status |
|---|---|---|
| Android | claw-use-android | ✅ Available |
| iOS | claw-use-ios | 🔮 Planned |
| Desktop | claw-use-desktop | 🔮 Planned |
Prerequisites
cuCLI installed (ships with claw-use-android, or install standalone)- At least one device running a Claw Use implementation
- Device and agent on the same network (or connected via Tailscale)
Setup
# Add a device with a friendly name
cu add redmi 192.168.0.105 <token>
cu add pixel 100.80.1.10 <token>
# List devices
cu devices
# ▸ redmi 192.168.0.105 online v1.2.0
# pixel 100.80.1.10 offline
# Switch default
cu use pixel
# Target a specific device
cu -d redmi screenshot
Core API (all platforms)
Every Claw Use implementation exposes the same HTTP endpoints:
Perception — read the device
cu screen # UI tree (semantic: element text, bounds, state)
cu screen -c # compact mode (interactive elements only)
cu screenshot # visual capture (JPEG, configurable quality)
cu notifications # system notifications
cu status # device health dashboard
Action — control the device
cu tap <x> <y> # tap coordinates
cu click <text> # tap by visible text (semantic click)
cu type "text" # type text (CJK supported)
cu swipe up|down|left|right
cu scroll up|down|left|right
cu back / cu home # system navigation
cu launch <app> # open an application
cu open <url> # open URL
cu intent '<json>' # platform-specific intent (Android)
Audio
cu tts "hello" # speak through device speaker
cu say "你好" # alias
Device State
cu wake # wake screen
cu lock / cu unlock # lock/unlock (PIN required for unlock)
Workflow Patterns
Navigate and interact
cu launch org.telegram.messenger
cu screen -c # see what's on screen
cu click "Search"
cu type "John"
cu click "John, last seen recently"
cu type "Hey!"
cu click "Send"
Visual + semantic dual-channel
cu screen -c # semantic: what elements exist
cu screenshot 50 720 /tmp/look.jpg # visual: what it actually looks like
Multi-device orchestration
cu -d phone1 launch com.whatsapp
cu -d phone2 screenshot
cu -d tablet open "https://example.com"
For Agent Developers
Claw Use is designed as a protocol, not just an app. To add support for a new platform:
- Implement the Claw Use HTTP API spec
- Expose endpoints on a configurable port (default: 7333)
- Support token auth via
X-Bridge-Tokenheader - Return JSON responses matching the documented schemas
The cu CLI and this skill work automatically with any compliant implementation.
Tips
cu screen -cis the primary perception tool — compact mode filters noisecu clickby text is more reliable thancu tapwhen text is visiblecu screenshotwhen you need visual context the UI tree can't capture- Auto-unlock is transparent: locked devices auto-unlock before any command
- Combine with Tailscale for remote access from anywhere
Files
1 totalSelect a file
Select a file to preview.
Comments
Loading comments…
