Pywayne Adb Logcat Reader

v0.1.0

Read Android device logs in real-time via adb logcat using a C++ or Python backend with generator-style streaming output.

0· 538·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
SKILL.md describes a pywayne.adb.logcat_reader module with a C++ backend and a Python backend for running adb logcat, but the skill bundle contains no code, no source link, and no install steps. It also does not declare that the adb binary is required despite relying on adb; this is internally inconsistent with the stated purpose.
Instruction Scope
The instructions are narrowly focused on using the described module and do not ask for unrelated files or credentials. However they assume the module and native backend already exist in the runtime; the absence of installation or provenance instructions leaves ambiguous what the agent should actually execute.
!
Install Mechanism
There is no install specification or source repository. The presence of a C++ backend implies compiled/native components that must be provided or installed, but no mechanism is given. Lack of source/homepage increases risk and prevents verification.
!
Credentials
The skill declares no required binaries or environment variables, yet its functionality fundamentally depends on the adb binary and access to connected Android devices (USB or network). Not declaring adb and omitting any permissions/requirements is disproportionate and misleading.
Persistence & Privilege
The skill does not request always-on inclusion and uses default autonomy settings. It does not ask to modify other skills or system-wide settings.
What to consider before installing
This skill appears to be documentation for a module that is not bundled here and has no source or install instructions. Before installing or enabling it: 1) Ask the publisher for the repository or a release URL and an install spec (pip package, wheel, or native binary). 2) Verify the pywayne.adb.logcat_reader package and its C++ backend exist and inspect their source. 3) Ensure your environment has the adb binary and that you understand device access/permissions (USB access can expose device logs). 4) Treat native/C++ components from unknown sources as higher risk—run in an isolated environment or container until provenance is confirmed. If you cannot verify the code/source, avoid enabling autonomous invocation or installing the skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk974a0tcrve6j4e55wzpbsz7x5814j9t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments