Claim this agent
Agent DossierGITHUB OPENCLEWSafety 89/100

Xpersona Agent

android-agent

android-agent — AI-Powered Android Phone Control android-agent — AI-Powered Android Phone Control Plug your old Android phone into your Mac/PC. Now your AI assistant can use it. Got an old Android in a drawer? Connect it to any machine running OpenClaw — your gateway, a Mac Mini, a Raspberry Pi. Your AI can now open apps, tap buttons, type text, and complete tasks on a real phone. Book a cab, order food, check your bank app — anything you'd do with your thumbs. How

OpenClaw · self-declared
Trust evidence available
git clone https://github.com/harshilmathur/android-agent.git

Overall rank

#41

Adoption

No public adoption signal

Trust

Unknown

Freshness

Feb 25, 2026

Freshness

Last checked Feb 25, 2026

Best For

android-agent is best for use, now, forward workflows where OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack

Overview

Key links, install path, reliability highlights, and the shortest practical read before diving into the crawl record.

Verifiededitorial-content

Overview

Executive Summary

android-agent — AI-Powered Android Phone Control android-agent — AI-Powered Android Phone Control Plug your old Android phone into your Mac/PC. Now your AI assistant can use it. Got an old Android in a drawer? Connect it to any machine running OpenClaw — your gateway, a Mac Mini, a Raspberry Pi. Your AI can now open apps, tap buttons, type text, and complete tasks on a real phone. Book a cab, order food, check your bank app — anything you'd do with your thumbs. How Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.

No verified compatibility signals

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Feb 25, 2026

Vendor

Harshilmathur

Artifacts

0

Benchmarks

0

Last release

Unpublished

Install & run

Setup Snapshot

git clone https://github.com/harshilmathur/android-agent.git
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence & Timeline

Public facts grouped by evidence type, plus release and crawl events with provenance and freshness.

Verifiededitorial-content

Public facts

Evidence Ledger

Vendor (1)

Vendor

Harshilmathur

profilemedium
Observed Apr 15, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

OpenClaw

contractmedium
Observed Apr 15, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Artifacts & Docs

Parameters, dependencies, examples, extracted files, editorial overview, and the complete README when available.

Self-declaredGITHUB OPENCLEW

Captured outputs

Artifacts Archive

Extracted files

0

Examples

6

Snippets

0

Languages

typescript

Parameters

Executable Examples

text

┌─────────────┐    screenshots    ┌──────────────┐    ADB commands    ┌─────────────┐
│  GPT-4o     │◄─────────────────│  DroidRun    │──────────────────►│  Android    │
│  Vision     │─────────────────►│  Agent       │◄──────────────────│  Phone      │
│             │   tap/type/swipe  │              │    screen state    │             │
└─────────────┘                   └──────────────┘                    └─────────────┘

text

[Gateway Machine] ──USB──► [Android Phone]

text

[Gateway] ──network──► [Mac Mini / Pi node] ──USB──► [Android Phone]

bash

# Plug phone in via USB, then:
pip install -r requirements.txt
adb devices  # verify phone shows up — authorize on phone if prompted

bash

export OPENAI_API_KEY="sk-..."
python scripts/run-task.py "Open Settings and turn on Dark Mode"

bash

python scripts/run-task.py "Order an Uber to the airport"
python scripts/run-task.py "Set an alarm for 6 AM tomorrow"
python scripts/run-task.py "Check my bank balance on PhonePe"
python scripts/run-task.py "Open Google Maps and navigate to the nearest coffee shop"

Editorial read

Docs & README

Docs source

GITHUB OPENCLEW

Editorial quality

ready

android-agent — AI-Powered Android Phone Control android-agent — AI-Powered Android Phone Control Plug your old Android phone into your Mac/PC. Now your AI assistant can use it. Got an old Android in a drawer? Connect it to any machine running OpenClaw — your gateway, a Mac Mini, a Raspberry Pi. Your AI can now open apps, tap buttons, type text, and complete tasks on a real phone. Book a cab, order food, check your bank app — anything you'd do with your thumbs. How

Full README

android-agent — AI-Powered Android Phone Control

Plug your old Android phone into your Mac/PC. Now your AI assistant can use it.

Got an old Android in a drawer? Connect it to any machine running OpenClaw — your gateway, a Mac Mini, a Raspberry Pi. Your AI can now open apps, tap buttons, type text, and complete tasks on a real phone. Book a cab, order food, check your bank app — anything you'd do with your thumbs.

How It Works

Your AI agent sees the phone screen (via screenshots), decides what to tap/type/swipe, and executes actions via ADB. Under the hood it uses DroidRun with GPT-4o vision.

┌─────────────┐    screenshots    ┌──────────────┐    ADB commands    ┌─────────────┐
│  GPT-4o     │◄─────────────────│  DroidRun    │──────────────────►│  Android    │
│  Vision     │─────────────────►│  Agent       │◄──────────────────│  Phone      │
│             │   tap/type/swipe  │              │    screen state    │             │
└─────────────┘                   └──────────────┘                    └─────────────┘

Works Two Ways

Direct Mode

Phone plugged into your OpenClaw gateway machine via USB. Zero networking required.

[Gateway Machine] ──USB──► [Android Phone]

Node Mode

Phone plugged into a Mac Mini, Raspberry Pi, or any OpenClaw node. The gateway controls it over the network.

[Gateway] ──network──► [Mac Mini / Pi node] ──USB──► [Android Phone]

For Node mode, connect ADB over TCP/WiFi so the node can forward commands.

Quick Start (3 steps)

1. Enable USB Debugging

On your Android phone:

  • Go to Settings → About Phone
  • Tap Build Number 7 times to enable Developer Options
  • Go to Settings → Developer Options
  • Enable USB Debugging

2. Connect & Install

# Plug phone in via USB, then:
pip install -r requirements.txt
adb devices  # verify phone shows up — authorize on phone if prompted

3. Run Your First Task

export OPENAI_API_KEY="sk-..."
python scripts/run-task.py "Open Settings and turn on Dark Mode"

That's it. The script handles everything: waking the screen, unlocking, keeping the display on, and running your task.

What Can It Do?

📱 Daily Life

python scripts/run-task.py "Order an Uber to the airport"
python scripts/run-task.py "Set an alarm for 6 AM tomorrow"
python scripts/run-task.py "Check my bank balance on PhonePe"
python scripts/run-task.py "Open Google Maps and navigate to the nearest coffee shop"

💬 Messaging

python scripts/run-task.py "Send a WhatsApp message to Mom saying I'll be late"
python scripts/run-task.py "Read my latest SMS messages"
python scripts/run-task.py "Open Telegram and check unread messages"

🛒 Shopping

python scripts/run-task.py "Open Amazon and search for wireless earbuds under 2000 rupees"
python scripts/run-task.py "Add milk and bread to my Instamart cart"

📅 Productivity

python scripts/run-task.py "Open Google Calendar and check my schedule for tomorrow"
python scripts/run-task.py "Create a new note in Google Keep: Buy groceries"

🎵 Entertainment

python scripts/run-task.py "Play my Discover Weekly playlist on Spotify"
python scripts/run-task.py "Open YouTube and search for lo-fi study music"

⚙️ Settings & Setup

python scripts/run-task.py "Turn on Dark Mode"
python scripts/run-task.py "Connect to my home WiFi network"
python scripts/run-task.py "Enable Do Not Disturb mode"
python scripts/run-task.py "Turn off Bluetooth"

📸 Utilities

python scripts/run-task.py "Take a screenshot"
python scripts/run-task.py "Open the camera and take a photo"
python scripts/run-task.py "Clear all notifications"

Environment Variables

| Variable | Required | Description | |----------|----------|-------------| | OPENAI_API_KEY | Yes | API key for GPT-4o vision | | ANDROID_SERIAL | No | Device serial number. Auto-detected if only one device is connected | | ANDROID_PIN | No | Phone PIN/password for auto-unlock. If not set, unlock is skipped | | DROIDRUN_TIMEOUT | No | Task timeout in seconds (default: 120) |

Setup Details

Direct Mode (USB)

  1. Install ADB:

    # macOS
    brew install android-platform-tools
    
    # Ubuntu/Debian
    sudo apt install android-tools-adb
    
    # Windows
    # Download from https://developer.android.com/tools/releases/platform-tools
    
  2. Connect phone via USB and verify:

    ./scripts/connect.sh usb
    
  3. Install DroidRun Portal APK on the phone:

    • Download from DroidRun releases
    • Or sideload: adb install droidrun-portal.apk
    • Open the Portal app on the phone and grant accessibility permissions
  4. Install Python dependencies:

    pip install -r requirements.txt
    

Node Mode (Remote via WiFi/TCP)

  1. On the node machine (Mac Mini, Pi, etc.), connect the phone via USB and enable WiFi ADB:

    adb tcpip 5555
    adb connect <phone-ip>:5555
    
  2. From your gateway, connect to the node's ADB:

    # If using SSH tunnel:
    ssh -L 15555:<phone-ip>:5555 user@node-ip
    export ANDROID_SERIAL="127.0.0.1:15555"
    
    # Or direct WiFi (same network):
    ./scripts/connect.sh wifi <phone-ip>
    
  3. Run tasks as normal — the script uses whatever ANDROID_SERIAL points to.

DroidRun Portal Setup

The DroidRun Portal APK must be installed and running on the phone. It provides the accessibility service that allows DroidRun to read screen content and interact with UI elements.

  1. Install the APK (download from DroidRun GitHub releases)
  2. Open the Portal app
  3. Grant Accessibility Service permission when prompted
  4. Keep it running in the background

Script Reference

scripts/run-task.py — The Main Script

# Basic usage
python scripts/run-task.py "Your task description here"

# With options
python scripts/run-task.py --timeout 180 "Install Spotify from Play Store"
python scripts/run-task.py --model gpt-4o "Open Chrome and search for weather"
python scripts/run-task.py --no-unlock "Take a screenshot"
python scripts/run-task.py --serial 127.0.0.1:15555 "Check notifications"
python scripts/run-task.py --verbose "Open Settings"

Options: | Flag | Description | |------|-------------| | goal | Task description (positional, required) | | --timeout | Timeout in seconds (default: 120, or DROIDRUN_TIMEOUT env) | | --model | LLM model to use (default: gpt-4o) | | --no-unlock | Skip the auto-unlock step | | --serial | Device serial (default: ANDROID_SERIAL env or auto-detect) | | --verbose | Show detailed debug output |

scripts/connect.sh — Setup & Verify Connection

./scripts/connect.sh          # Auto-detect USB device
./scripts/connect.sh usb      # USB mode (explicit)
./scripts/connect.sh wifi 192.168.1.100  # WiFi/TCP mode

scripts/screenshot.sh — Screenshot (ADB screencap, reliable)

DroidRun’s internal screenshot sometimes fails on certain devices. Use this to bypass DroidRun and capture a PNG directly via ADB.

# Save to /tmp/android-screenshot.png
./scripts/screenshot.sh

# Explicit serial + output path
./scripts/screenshot.sh 127.0.0.1:15555 /tmp/a03.png

You can also do it from Python:

python scripts/run-task.py --screenshot --serial 127.0.0.1:15555 --screenshot-path /tmp/a03.png

scripts/status.sh — Device Status

./scripts/status.sh
# Output:
# 📱 Device: Samsung Galaxy A03 (SM-A035F)
# 🤖 Android: 11 (API 30)
# 🔋 Battery: 87%
# 📺 Screen: ON (unlocked)
# 🔌 Connection: USB
# 📦 DroidRun Portal: installed (v0.5.5)

Troubleshooting

"no devices/emulators found"

  • Check USB cable (use a data cable, not charge-only)
  • Authorize the computer on your phone's USB debugging prompt
  • Try adb kill-server && adb start-server

"device unauthorized"

  • Disconnect and reconnect USB
  • Check the phone screen for an authorization dialog
  • If no dialog appears, revoke USB debugging authorizations in Developer Options and reconnect

Phone screen turns off during task

  • The script sets keep-awake mode automatically, but some phones override this
  • Manually: Settings → Developer Options → Stay Awake (while charging)

Task fails with dialog/popup blocking

  • The script tries to dismiss common dialogs automatically
  • For persistent popups, dismiss them manually first, then retry
  • Use --verbose to see what the agent is seeing

WiFi ADB disconnects after reboot

  • WiFi ADB mode resets on phone reboot — you need to re-enable it via USB
  • Run ./scripts/connect.sh usb first, then ./scripts/connect.sh wifi <ip>

DroidRun agent seems confused

  • Make sure DroidRun Portal is running and accessibility service is enabled
  • Close unnecessary apps to reduce screen complexity
  • Try a simpler task first to verify the setup works

PIN unlock fails

  • PIN pad button coordinates vary by device and screen resolution
  • To find your device's coordinates: adb shell getevent -l and tap each digit
  • Or use adb shell input text <PIN> as a fallback on some devices
  • Set ANDROID_PIN environment variable (never hardcode it)

Security

  • ADB grants full device access — only connect devices you trust and own
  • Screenshots are sent to your LLM provider (OpenAI by default) — be mindful of sensitive content on screen (banking apps, private messages)
  • PIN is read from environment variable only — never stored in files or logs
  • WiFi ADB is unencrypted — use USB or an SSH tunnel on untrusted networks
  • DroidRun Portal requires accessibility permissions — this is powerful access; understand what it enables

Requirements

  • Python 3.10+
  • ADB (Android Debug Bridge)
  • Android 8.0+ phone with Developer Options and USB Debugging enabled
  • DroidRun Portal APK installed on phone
  • OpenAI API key (GPT-4o for vision capabilities)
  • USB data cable (not charge-only)

⚠️ Security Notes

Use a dedicated test device, not your primary phone.

  • Screenshots & screen text go to OpenAI. Every screenshot the agent takes is sent to GPT-4o for vision processing. Don't run this on devices with sensitive data visible — banking apps, 2FA tokens, private messages, medical info. If it's on screen, it's sent to the cloud.
  • ANDROID_PIN is stored as an environment variable. While it's never written to files or logs, anyone with access to the host's environment can read it. Use a disposable device PIN you don't use elsewhere, or accept the risk.
  • Only install DroidRun Portal from official sources. Download the APK exclusively from DroidRun GitHub releases. Never sideload APKs from third-party sites.
  • ADB grants full device access. Combined with accessibility permissions, this is effectively root-level control. Only connect devices you own and are comfortable exposing.
  • WiFi ADB is unencrypted. If using TCP/WiFi mode on an untrusted network, wrap it in an SSH tunnel.

Bottom line: Treat the connected phone as a "work device for AI." Don't leave personal accounts logged in. Don't store secrets on it. If you wouldn't hand your unlocked phone to a stranger, don't point this skill at it.

License

MIT — see LICENSE

API & Reliability

Machine endpoints, contract coverage, trust signals, runtime metrics, benchmarks, and guardrails for agent-to-agent use.

MissingGITHUB OPENCLEW

Machine interfaces

Contract & API

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

OpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/harshilmathur-android-agent/snapshot"
curl -s "https://xpersona.co/api/v1/agents/harshilmathur-android-agent/contract"
curl -s "https://xpersona.co/api/v1/agents/harshilmathur-android-agent/trust"

Operational fit

Reliability & Benchmarks

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Machine Appendix

Raw contract, invocation, trust, capability, facts, and change-event payloads for machine-side inspection.

MissingGITHUB OPENCLEW

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/harshilmathur-android-agent/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/harshilmathur-android-agent/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/harshilmathur-android-agent/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/harshilmathur-android-agent/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/harshilmathur-android-agent/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/harshilmathur-android-agent/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_OPENCLEW",
      "generatedAt": "2026-04-17T04:42:05.665Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "use",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "now",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "forward",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "it",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "also",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "read",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:use|supported|profile capability:now|supported|profile capability:forward|supported|profile capability:it|supported|profile capability:also|supported|profile capability:read|supported|profile"
}

Facts JSON

[
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Harshilmathur",
    "href": "https://github.com/harshilmathur/android-agent",
    "sourceUrl": "https://github.com/harshilmathur/android-agent",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:21:22.124Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/harshilmathur-android-agent/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/harshilmathur-android-agent/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:21:22.124Z",
    "isPublic": true
  },
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/harshilmathur-android-agent/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/harshilmathur-android-agent/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub · GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to android-agent and adjacent AI workflows.