https://github.com/blakadder/tuya-uncover
List devices from Tuya OEM apps and reveal their local keys and uuid
https://github.com/blakadder/tuya-uncover
home-assistant proscenic smart-home smart-life smarthome tuya
Last synced: 7 months ago
JSON representation
List devices from Tuya OEM apps and reveal their local keys and uuid
- Host: GitHub
- URL: https://github.com/blakadder/tuya-uncover
- Owner: blakadder
- License: cc0-1.0
- Created: 2023-07-16T18:45:30.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2025-02-23T00:55:19.000Z (7 months ago)
- Last Synced: 2025-03-17T04:21:18.348Z (7 months ago)
- Topics: home-assistant, proscenic, smart-home, smart-life, smarthome, tuya
- Language: Python
- Homepage:
- Size: 42 KB
- Stars: 39
- Watchers: 4
- Forks: 5
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# tuya-uncover
[](https://ko-fi.com/S6S650JEK)
A simple Python script to list devices from Tuya OEM apps and reveal their local keys and [Data Points](https://developer.tuya.com/en/docs/iot-device-dev/tuyaos-gateway-device-datapoint?id=Kc80mqozruc72) it uses.
Supports these vendors/apps:
- Smart Life (default)
- Tuya
- BirdLover
- Brennenstuhl
- Gosund
- Ledvance
- Proscenic
- Sylvania
- Ultenic
- Tesla
- LSC Smart Connect
- Philips Smart Select
- AlecoAir
- Nous Smart
- Nedis Smartlife
- Blitzwolf
- Airam SmartHome
- Teratlife
- Setti+
- Overmax Control
- Artika
- Xtreme Connected Home
- Atomi Smart
- Cree Lighting*Not all apps are verified as working since some keys were found randomly on the internet.*
Goes well with [make-all/tuya-local](https://github.com/make-all/tuya-local) Home Assistant custom component.
## Use
Requires Python installed!
```shell
uncover.py -v vendor username password
````uncover.py -h` for all options
Passwords using special characters might need to be escaped in `"` (e.g. `python uncover.py -r eu -v ledvance test@test.com "my$pass@word&"`
### Requirements
```shell
pip install requests
```And maybe more... Let me know!
## Thanks to
Main code from [@avataar gist](https://gist.github.com/avataar/2a6ee4f58aaedfcc062a838380f3cffb).
App secrets deciphered with instructions from [https://rgsilva.com/blog/reverse-engineering-positivos-smart-home-app/](https://rgsilva.com/blog/reverse-engineering-positivos-smart-home-app/) and
Some keys found on [rospogrigio/localtuya](https://github.com/rospogrigio/localtuya/issues/1188)