Back to skill
Skillv1.0.0
ClawScan security
Xiaomi · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousFeb 11, 2026, 9:00 AM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's description and install hints claim bundled scripts and automatic setup, but the package contains no code files (no token extractor or scripts) and the instructions omit how Xiaomi cloud credentials/tokens are obtained — these mismatches merit caution.
- Guidance
- This skill appears to describe useful local control via miiocli, but the package is instruction-only: it references a token_extractor script and other files that are not included. Before installing or running anything: 1) Ask the publisher for the missing scripts or source code and inspect them (token-extraction code can handle sensitive credentials). 2) If you must fetch device tokens, do so manually or with trusted tools — do not hand over Xiaomi account credentials to unknown scripts. 3) If you run the provided pipx install, be aware the command assumes a specific pipx venv path and will modify your Python environment; prefer installing python-miio yourself and verify the click version change. 4) Only proceed if you trust the skill source and have verified the token extraction method and storage location for your device tokens.
Review Dimensions
- Purpose & Capability
- concernThe README claims a "built-in Token Extractor" script (scripts/token_extractor.py), pre-configured workflows, and an automatic dependency fix. The published bundle contains no code files—only SKILL.md—so the claimed scripts/resources are missing. The skill does correctly declare it requires the miiocli binary, which matches the stated purpose, but the advertised bundled tooling is absent.
- Instruction Scope
- concernInstructions tell the user/agent to run a token extractor to fetch device IPs and 32‑byte device tokens from Xiaomi Cloud, and to store device details in local reference files. The SKILL.md does not explain how Xiaomi account credentials are provided, and the extractor script it references is not present—so the runtime instructions cannot be followed as written and implicitly require credentials or browser cookies that are not declared.
- Install Mechanism
- noteThe SKILL.md metadata suggests installing python-miio via pipx and then forcing a click<8.1.0 install inside the pipx venv. Installing python-miio from PyPI via pipx is a reasonable approach, not high risk, but the install command hardcodes a user-specific path (/Users/$(whoami)/.local/pipx/venvs/...), which is platform-specific and brittle. There is no arbitrary URL download or archive extraction.
- Credentials
- concernThe skill declares no required environment variables or credentials, yet its instructions refer to extracting tokens from Xiaomi Cloud (which normally requires Xiaomi account credentials, cookies, or other secrets). The absence of any declared credential requirements is a mismatch and leaves unclear how sensitive credentials would be supplied or handled.
- Persistence & Privilege
- okThe skill does not request always:true or any persistent privileged configuration. It is user-invocable and allows autonomous invocation (default), which is normal; there is no evidence it modifies other skills or system-wide settings.
