ClawKit Logo
ClawKitReliability Toolkit
Back to Registry
Official Verified system Safety 2/5

working-with-lockdownd

Comprehensive toolkit for interacting with iOS devices over WiFi using the Apple Lockdown Protocol (port 62078). Capabilities include device identification, real-time log streaming (syslog/os_trace), property querying (GetValue), and cryptographic secret extraction. Incorporates research from 'The Orchard' - woflo's research project regarding iOS 17+ security boundaries and WiFi capabilities.

Why use this skill?

Use the working-with-lockdownd skill to remotely query, monitor, and extract secrets from paired iOS devices over WiFi based on The Orchard research.

skill-install — Terminal

Install via CLI (Recommended)

clawhub install openclaw/skills/skills/worflor/working-with-lockdownd
Or

What This Skill Does

The working-with-lockdownd skill serves as a sophisticated interface for interacting with iOS devices over WiFi via the Apple Lockdown Protocol (port 62078). Inspired by woflo's 'The Orchard' research, this toolkit enables developers and security researchers to communicate with paired iOS devices without a physical tether. It acts as a bridge for extracting system properties, real-time log streaming, and sensitive cryptographic material. Whether you are debugging system-level logs, querying device hardware metadata, or performing authorized secret extraction, this skill provides a stable, scriptable pathway to the device's internal lockdown services.

Installation

To add this capability to your agent, execute the following command in your terminal:

clawhub install openclaw/skills/skills/worflor/working-with-lockdownd

Ensure that you have an existing pairing record for the target iOS device in your working directory. The tool relies on these records to authenticate the session over the wireless network.

Use Cases

  • Remote Debugging: Stream syslog or os_trace data directly from a device placed in a remote test rack.
  • Asset Management: Rapidly pull hardware serials, battery health, and device identifiers from a fleet of paired devices.
  • Security Research: Analyze Apple security boundaries by inspecting escrow bags and activation records, leveraging the research mapped out in 'The Orchard'.
  • Automation: Build workflows that trigger specific iOS events via notification_proxy or monitor device state changes.

Example Prompts

  1. "Check the current battery health and serial number of the connected iPhone using the lockdownd tool."
  2. "Start streaming the syslog from the iOS device and filter for error messages related to the network stack."
  3. "Run the secret extraction script to retrieve the Find My Network keys from the currently paired device."

Tips & Limitations

  • Safety First: Avoid EnterRecovery commands, as they will drop the WiFi connection and render the device unresponsive until physical access is restored.
  • Data Handling: The secrets retrieved by this skill are highly sensitive; ensure all exported data is stored in encrypted environments.
  • Persistence: While you can query properties easily, be aware that many SetValue operations are ephemeral and might not survive a device reboot or kernel-level security re-validation.
  • Stability: If the device stops responding, it may have flagged the connection as an InvalidHostID. Disconnect, verify your pairing record, and try again after a brief cooldown period.

Metadata

Author@worflor
Stars919
Views1
Updated2026-02-12
View Author Profile
AI Skill Finder

Not sure this is the right skill?

Describe what you want to build — we'll match you to the best skill from 16,000+ options.

Find the right skill
Add to Configuration

Paste this into your clawhub.json to enable this plugin.

{
  "plugins": {
    "official-worflor-working-with-lockdownd": {
      "enabled": true,
      "auto_update": true
    }
  }
}

Tags(AI)

#ios#lockdown#security#wifi#debugging
Safety Score: 2/5

Flags: network-access, file-read, data-collection, code-execution