Android Device Automation
Audited by Socket on Feb 15, 2026
1 alert found:
Malware[Skill Scanner] Natural language instruction to download and install from URL detected All findings: [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] This Skill.md is internally consistent with its described purpose: vision-driven Android automation that uses an external model and the midscene Android CLI to control devices via ADB. There are no hardcoded secrets, obfuscated payloads, or suspicious external download hosts in the provided document. The primary security concerns are operational: it requires high-privilege access to an Android device (ADB) and an API key for a model provider. The instructions to run multi-step actions without intermediate screenshots (to handle transient UI) increase the chance of unintended or destructive actions if the agent or operator is not careful. Overall the file itself is not malicious, but it enables powerful actions that are high-risk if misused or if the downstream CLI or model provider is compromised. LLM verification: The Skill is documentation for a legitimate-seeming Android automation tool and its capabilities match its stated purpose. There is no obfuscated code or hardcoded secrets in the provided text. However, it requires high-privilege access (ADB) and a model API key plus an arbitrary model base URL; that combination enables credential and screenshot exfiltration if the configured model endpoint is malicious or compromised. The document therefore represents a moderate supply-chain risk (suspicious) r