{
  "schemaVersion": "1.0",
  "item": {
    "slug": "icloud",
    "name": "iCloud",
    "source": "tencent",
    "type": "skill",
    "category": "效率提升",
    "sourceUrl": "https://clawhub.ai/ivangdavila/icloud",
    "canonicalUrl": "https://clawhub.ai/ivangdavila/icloud",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/icloud",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=icloud",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md",
      "auth-session.md",
      "drive-ops.md",
      "findmy-ops.md",
      "memory-template.md",
      "photos-ops.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-30T16:55:25.780Z",
      "expiresAt": "2026-05-07T16:55:25.780Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
        "contentDisposition": "attachment; filename=\"network-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/icloud"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/icloud",
    "agentPageUrl": "https://openagent3.xyz/skills/icloud/agent",
    "manifestUrl": "https://openagent3.xyz/skills/icloud/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/icloud/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Setup",
        "body": "On first use, read setup.md for secure integration guidelines."
      },
      {
        "title": "When to Use",
        "body": "Use this skill when the user wants agents to interact with their own iCloud account: list devices, retrieve Find My status, inspect iCloud Drive, or pull photo metadata/files.\nUse it for operational automation with strict safety gates, not for bypassing Apple account security."
      },
      {
        "title": "Architecture",
        "body": "Memory lives in ~/icloud/. See memory-template.md for structure and status fields.\n\n~/icloud/\n|-- memory.md               # Status, integration mode, and current account scope\n|-- operations-log.md       # Executed commands, result checks, and rollback notes\n|-- device-map.md           # Known device aliases and stable IDs\n|-- drive-map.md            # iCloud Drive folder map and verified paths\n`-- safety-events.md        # Confirmed risky actions and explicit approvals"
      },
      {
        "title": "Quick Reference",
        "body": "Load only the file needed for the current task.\n\nTopicFileSetup flowsetup.mdMemory templatememory-template.mdAuthentication and session handlingauth-session.mdFind My operationsfindmy-ops.mdiCloud Drive operationsdrive-ops.mdPhotos operationsphotos-ops.mdSafety boundaries and confirmationssafety-boundaries.md"
      },
      {
        "title": "1. Authenticate Locally, Never Through Chat",
        "body": "Never ask the user to paste Apple password, 2FA code, session token, or app password in conversation.\nUse interactive local auth with terminal prompts or secure local input prompts only."
      },
      {
        "title": "2. Start Read-Only, Then Escalate",
        "body": "Run read-only discovery first: account reachability, device list, folder listing, metadata checks.\nDo not run write operations until read checks pass and scope is explicit."
      },
      {
        "title": "3. Require Explicit Confirmation for Risky Actions",
        "body": "Treat lost mode, message push, file rename/delete, and bulk upload as risky.\nBefore running risky actions, summarize target, effect, and rollback option, then request explicit confirmation."
      },
      {
        "title": "4. Use Deterministic Verification After Every Action",
        "body": "After each operation, verify expected state with a second read call.\nNever report success from command exit code alone."
      },
      {
        "title": "5. Keep Operations Narrow and Idempotent",
        "body": "Operate on one device ID or one file path per step when possible.\nPrefer repeat-safe commands and avoid broad wildcard operations."
      },
      {
        "title": "6. Handle 2FA and Session Expiry as Normal State",
        "body": "If Apple invalidates the session, pause destructive operations and re-auth first.\nContinue only after session trust is restored and read checks succeed again."
      },
      {
        "title": "7. Persist Only Minimal Operational Context",
        "body": "Store only what improves reliability (IDs, verified paths, successful patterns).\nNever persist secrets or raw credential material in local memory files."
      },
      {
        "title": "Common Traps",
        "body": "Asking for Apple credentials in chat -> immediate privacy and trust failure.\nRunning write operations before discovery -> wrong device/path targeted.\nUsing device names without IDs -> ambiguous actions on similarly named devices.\nAssuming session validity across days -> sudden auth failures mid-workflow.\nExecuting bulk file changes without snapshot -> difficult rollback after mistakes.\nClaiming action success without re-read verification -> silent failures reach users."
      },
      {
        "title": "External Endpoints",
        "body": "EndpointData SentPurposehttps://idmsa.apple.comApple account auth payload during loginApple ID authenticationhttps://setup.icloud.comSession and webservice negotiationiCloud service bootstraphttps://www.icloud.comService API requests (Drive/Photos/Find My)iCloud operationshttps://idmsa.apple.com.cnApple account auth payload (China mainland accounts)Regional Apple ID authenticationhttps://setup.icloud.com.cnSession and webservice negotiation (China mainland accounts)Regional iCloud bootstraphttps://pypi.orgPackage metadata (install time only)Install pyicloudhttps://files.pythonhosted.orgPackage download (install time only)Install pyicloud\n\nNo other data is sent externally by this skill's documented workflow."
      },
      {
        "title": "Security & Privacy",
        "body": "Data that leaves your machine:\n\nApple account authentication and iCloud API requests needed for requested operations.\nPackage install traffic only when installing dependencies.\n\nData that stays local:\n\nOptional operational notes under ~/icloud/.\nLocal keyring entries managed by the pyicloud tool if the user chooses to store password.\n\nThis skill does NOT:\n\nBypass Apple security flows or 2FA requirements.\nRequest undeclared credentials in chat.\nExecute undeclared network endpoints.\nModify its own SKILL file."
      },
      {
        "title": "Trust",
        "body": "By using this skill, you trust Apple iCloud endpoints and the pyicloud package.\nOnly install and run this workflow if you trust these services with your account operations."
      },
      {
        "title": "Related Skills",
        "body": "Install with clawhub install <slug> if user confirms:\n\ncloud-storage - Cross-provider storage workflows and transfer safety checks\nios - Apple device settings, permissions, and account behavior troubleshooting\nmacos - macOS security, keychain, and runtime diagnostics for Apple tooling\nphotos - Media management strategies when iCloud Photos is the main workload"
      },
      {
        "title": "Feedback",
        "body": "If useful: clawhub star icloud\nStay updated: clawhub sync"
      }
    ],
    "body": "Setup\n\nOn first use, read setup.md for secure integration guidelines.\n\nWhen to Use\n\nUse this skill when the user wants agents to interact with their own iCloud account: list devices, retrieve Find My status, inspect iCloud Drive, or pull photo metadata/files. Use it for operational automation with strict safety gates, not for bypassing Apple account security.\n\nArchitecture\n\nMemory lives in ~/icloud/. See memory-template.md for structure and status fields.\n\n~/icloud/\n|-- memory.md               # Status, integration mode, and current account scope\n|-- operations-log.md       # Executed commands, result checks, and rollback notes\n|-- device-map.md           # Known device aliases and stable IDs\n|-- drive-map.md            # iCloud Drive folder map and verified paths\n`-- safety-events.md        # Confirmed risky actions and explicit approvals\n\nQuick Reference\n\nLoad only the file needed for the current task.\n\nTopic\tFile\nSetup flow\tsetup.md\nMemory template\tmemory-template.md\nAuthentication and session handling\tauth-session.md\nFind My operations\tfindmy-ops.md\niCloud Drive operations\tdrive-ops.md\nPhotos operations\tphotos-ops.md\nSafety boundaries and confirmations\tsafety-boundaries.md\nCore Rules\n1. Authenticate Locally, Never Through Chat\nNever ask the user to paste Apple password, 2FA code, session token, or app password in conversation.\nUse interactive local auth with terminal prompts or secure local input prompts only.\n2. Start Read-Only, Then Escalate\nRun read-only discovery first: account reachability, device list, folder listing, metadata checks.\nDo not run write operations until read checks pass and scope is explicit.\n3. Require Explicit Confirmation for Risky Actions\nTreat lost mode, message push, file rename/delete, and bulk upload as risky.\nBefore running risky actions, summarize target, effect, and rollback option, then request explicit confirmation.\n4. Use Deterministic Verification After Every Action\nAfter each operation, verify expected state with a second read call.\nNever report success from command exit code alone.\n5. Keep Operations Narrow and Idempotent\nOperate on one device ID or one file path per step when possible.\nPrefer repeat-safe commands and avoid broad wildcard operations.\n6. Handle 2FA and Session Expiry as Normal State\nIf Apple invalidates the session, pause destructive operations and re-auth first.\nContinue only after session trust is restored and read checks succeed again.\n7. Persist Only Minimal Operational Context\nStore only what improves reliability (IDs, verified paths, successful patterns).\nNever persist secrets or raw credential material in local memory files.\nCommon Traps\nAsking for Apple credentials in chat -> immediate privacy and trust failure.\nRunning write operations before discovery -> wrong device/path targeted.\nUsing device names without IDs -> ambiguous actions on similarly named devices.\nAssuming session validity across days -> sudden auth failures mid-workflow.\nExecuting bulk file changes without snapshot -> difficult rollback after mistakes.\nClaiming action success without re-read verification -> silent failures reach users.\nExternal Endpoints\nEndpoint\tData Sent\tPurpose\nhttps://idmsa.apple.com\tApple account auth payload during login\tApple ID authentication\nhttps://setup.icloud.com\tSession and webservice negotiation\tiCloud service bootstrap\nhttps://www.icloud.com\tService API requests (Drive/Photos/Find My)\tiCloud operations\nhttps://idmsa.apple.com.cn\tApple account auth payload (China mainland accounts)\tRegional Apple ID authentication\nhttps://setup.icloud.com.cn\tSession and webservice negotiation (China mainland accounts)\tRegional iCloud bootstrap\nhttps://pypi.org\tPackage metadata (install time only)\tInstall pyicloud\nhttps://files.pythonhosted.org\tPackage download (install time only)\tInstall pyicloud\n\nNo other data is sent externally by this skill's documented workflow.\n\nSecurity & Privacy\n\nData that leaves your machine:\n\nApple account authentication and iCloud API requests needed for requested operations.\nPackage install traffic only when installing dependencies.\n\nData that stays local:\n\nOptional operational notes under ~/icloud/.\nLocal keyring entries managed by the pyicloud tool if the user chooses to store password.\n\nThis skill does NOT:\n\nBypass Apple security flows or 2FA requirements.\nRequest undeclared credentials in chat.\nExecute undeclared network endpoints.\nModify its own SKILL file.\nTrust\n\nBy using this skill, you trust Apple iCloud endpoints and the pyicloud package. Only install and run this workflow if you trust these services with your account operations.\n\nRelated Skills\n\nInstall with clawhub install <slug> if user confirms:\n\ncloud-storage - Cross-provider storage workflows and transfer safety checks\nios - Apple device settings, permissions, and account behavior troubleshooting\nmacos - macOS security, keychain, and runtime diagnostics for Apple tooling\nphotos - Media management strategies when iCloud Photos is the main workload\nFeedback\nIf useful: clawhub star icloud\nStay updated: clawhub sync"
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/ivangdavila/icloud",
    "publisherUrl": "https://clawhub.ai/ivangdavila/icloud",
    "owner": "ivangdavila",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/icloud",
    "downloadUrl": "https://openagent3.xyz/downloads/icloud",
    "agentUrl": "https://openagent3.xyz/skills/icloud/agent",
    "manifestUrl": "https://openagent3.xyz/skills/icloud/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/icloud/agent.md"
  }
}