Another

ReviewAudited by ClawScan on May 10, 2026.

Overview

This skill appears to do what it claims, but it gives an AI broad Android device control, including screenshots, text input, WiFi debugging, and arbitrary ADB shell commands.

Use this skill mainly on test devices or test profiles. Before using it on a personal device, verify the Another desktop app source, avoid sensitive apps or accounts, require confirmation before shell/WiFi/destructive actions, and disconnect or disable WiFi debugging when finished.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used on a personal or production device, an agent could change settings, affect app data, or expand device access beyond the immediate USB session.

Why it was flagged

The skill exposes raw ADB shell execution and WiFi debugging controls, but does not define safe command boundaries, require confirmation for destructive commands, or explain how WiFi debugging should be disabled after use.

Skill content
`another_shell` | Run an arbitrary adb shell command and get the output ... `another_wifi_enable` | Switch a USB device to WiFi debugging mode
Recommendation

Use this only with explicit user approval for shell, WiFi, app-changing, or account-affecting actions; prefer allowlisted commands and disable/disconnect WiFi debugging when finished.

What this means

The agent may be able to interact with signed-in apps or private device state if those are visible or accessible during the task.

Why it was flagged

These tools let the agent operate the Android device UI and apps using whatever access is already present on the device. This is aligned with the skill purpose, but it is privileged delegated control.

Skill content
`another_send_text` | Type text into the focused input field ... `another_launch_app` | Launch an app by package name ... `another_open_url` | Open a URL in the device's default browser
Recommendation

Prefer a test device or separate test profile, avoid sensitive accounts, and supervise actions in apps that can spend money, send messages, or change account data.

What this means

Users must independently trust and verify the local Another desktop app/MCP server before granting it device control.

Why it was flagged

The skill has no reviewed code or install package, and the metadata does not provide a homepage/source for validating the external desktop/MCP component it requires.

Skill content
Source: unknown; Homepage: none; Install specifications: No install spec — this is an instruction-only skill.
Recommendation

Install the desktop app only from a verified source and confirm the local MCP server is the intended one before connecting devices.

What this means

Private screen contents or shell output could enter the agent conversation/context while the device is being controlled.

Why it was flagged

Screenshots and device outputs flow through a local MCP endpoint to the agent. This is expected for the skill, but the artifact does not describe data handling or privacy boundaries.

Skill content
`another_take_screenshot` | Capture the screen as a PNG image ... url: http://localhost:7070/mcp
Recommendation

Keep sensitive information off-screen, avoid personal devices when possible, and use a controlled test environment for automation.