A simple Python script to list devices from Tuya OEM apps and reveal their local keys and Data Points it uses.
Supports these apps:
- Smart Life (default)
- Tuya
- BirdLover
- Brennenstuhl
- Gosund
- Ledvance
- Proscenic
- Sylvania
- Ultenic
Not all apps are verified as working since some keys were found randomly on the internet.
Goes well with make-all/tuya-local Home Assistant custom component.
Requires Python installed!
uncover.py -v vendor username password
uncover.py -h
for all options
pip install requests
And maybe more... Let me know!
Main code from @avataar gist.
App secrets deciphered with instructions from https://blog.rgsilva.com/reverse-engineering-positivos-smart-home-app/ and https://github.com/nalajcie/tuya-sign-hacking
Some keys found on rospogrigio/localtuya