Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Let agents operate your iCloud Drive, Photos, and Find My safely with local 2FA authentication and explicit confirmation gates.
Let agents operate your iCloud Drive, Photos, and Find My safely with local 2FA authentication and explicit confirmation gates.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
On first use, read setup.md for secure integration guidelines.
Use this skill when the user wants agents to interact with their own iCloud account: list devices, retrieve Find My status, inspect iCloud Drive, or pull photo metadata/files. Use it for operational automation with strict safety gates, not for bypassing Apple account security.
Memory lives in ~/icloud/. See memory-template.md for structure and status fields. ~/icloud/ |-- memory.md # Status, integration mode, and current account scope |-- operations-log.md # Executed commands, result checks, and rollback notes |-- device-map.md # Known device aliases and stable IDs |-- drive-map.md # iCloud Drive folder map and verified paths `-- safety-events.md # Confirmed risky actions and explicit approvals
Load only the file needed for the current task. TopicFileSetup flowsetup.mdMemory templatememory-template.mdAuthentication and session handlingauth-session.mdFind My operationsfindmy-ops.mdiCloud Drive operationsdrive-ops.mdPhotos operationsphotos-ops.mdSafety boundaries and confirmationssafety-boundaries.md
Never ask the user to paste Apple password, 2FA code, session token, or app password in conversation. Use interactive local auth with terminal prompts or secure local input prompts only.
Run read-only discovery first: account reachability, device list, folder listing, metadata checks. Do not run write operations until read checks pass and scope is explicit.
Treat lost mode, message push, file rename/delete, and bulk upload as risky. Before running risky actions, summarize target, effect, and rollback option, then request explicit confirmation.
After each operation, verify expected state with a second read call. Never report success from command exit code alone.
Operate on one device ID or one file path per step when possible. Prefer repeat-safe commands and avoid broad wildcard operations.
If Apple invalidates the session, pause destructive operations and re-auth first. Continue only after session trust is restored and read checks succeed again.
Store only what improves reliability (IDs, verified paths, successful patterns). Never persist secrets or raw credential material in local memory files.
Asking for Apple credentials in chat -> immediate privacy and trust failure. Running write operations before discovery -> wrong device/path targeted. Using device names without IDs -> ambiguous actions on similarly named devices. Assuming session validity across days -> sudden auth failures mid-workflow. Executing bulk file changes without snapshot -> difficult rollback after mistakes. Claiming action success without re-read verification -> silent failures reach users.
EndpointData SentPurposehttps://idmsa.apple.comApple account auth payload during loginApple ID authenticationhttps://setup.icloud.comSession and webservice negotiationiCloud service bootstraphttps://www.icloud.comService API requests (Drive/Photos/Find My)iCloud operationshttps://idmsa.apple.com.cnApple account auth payload (China mainland accounts)Regional Apple ID authenticationhttps://setup.icloud.com.cnSession and webservice negotiation (China mainland accounts)Regional iCloud bootstraphttps://pypi.orgPackage metadata (install time only)Install pyicloudhttps://files.pythonhosted.orgPackage download (install time only)Install pyicloud No other data is sent externally by this skill's documented workflow.
Data that leaves your machine: Apple account authentication and iCloud API requests needed for requested operations. Package install traffic only when installing dependencies. Data that stays local: Optional operational notes under ~/icloud/. Local keyring entries managed by the pyicloud tool if the user chooses to store password. This skill does NOT: Bypass Apple security flows or 2FA requirements. Request undeclared credentials in chat. Execute undeclared network endpoints. Modify its own SKILL file.
By using this skill, you trust Apple iCloud endpoints and the pyicloud package. Only install and run this workflow if you trust these services with your account operations.
Install with clawhub install <slug> if user confirms: cloud-storage - Cross-provider storage workflows and transfer safety checks ios - Apple device settings, permissions, and account behavior troubleshooting macos - macOS security, keychain, and runtime diagnostics for Apple tooling photos - Media management strategies when iCloud Photos is the main workload
If useful: clawhub star icloud Stay updated: clawhub sync
Workflow acceleration for inboxes, docs, calendars, planning, and execution loops.
Largest current source with strong distribution and engagement signals.