SUroot
Extreme Android User
This is a mid-level complexity profile that takes a photo of someone who incorrectly enters your pattern lock (in this example) twice and emails it to you.
This is based on multiple examples found but this is my own spin on it.
The filename of the photo is always the same so it overwrites itself, saving space because if, like me, you often put your pattern in wrong, you'll end up with a million pictures of yourself
Pre-requsites:
Profile
This is based on multiple examples found but this is my own spin on it.
The filename of the photo is always the same so it overwrites itself, saving space because if, like me, you often put your pattern in wrong, you'll end up with a million pictures of yourself

Pre-requsites:
- SL4a apk - android-scripting.googlecode.com
- Secure settings - Google Play
- Folder \sdcard\sl4a\scripts containing - sendemailA.py
- Python - Install through SL4a as below:
Only shell is included with the ASE install. Other interpreters must be installed separately. To add another interpreter:
Press the menu button
Tap "View"
Tap "Interpreters"
Press the menu button
Tap "Add"
Select the interpreter you would like to install
The selected interpreter will be downloaded via the Android web browser. Once it's finished downloading, tap the download notification to start the installation process as you would for any other downloaded APK.
After installing the interpreter APK, start it and tap the "Install" button. The interpreter, interpreter extras, and example scripts (if available) will be downloaded to /sdcard/xxx.zip and then extracted to /data/data/com.googlecode.android_scripting/files/xxx, /sdcard/sl4a/extras/xxx, and /sdcard/sl4a/scripts respectively.
Source - InstallingInterpreters - android-scripting - A howto for installing additional interpreters. - Scripting Layer for Android brings scripting languages to Android. - Google Project Hosting
I have attached the profile exported xml, in a zip. Put this (extracted) in /sdcard/tasker/profiles/. You will still need to do the above and add your email address and password to the tasks below though, but should save some time. UNTESTED
Profile
- Add (+) Profile, name "Intrusion"
- Select State > Plugin > Secure Settings > configuration Edit > Failed Login Attempts > (set your number, Tick "Device admin" and save
- New Task
- + Media > Take Photo > Camera "Front" > Filename "Last-intruder" (and apply)
- + Variable > Variable Set > name "%EMAIL_USER" to youremailaddress@here.com
- + Variable > Variable Set > name "%EMAIL_PSWD" to youremailpassword
- + Variable > Variable Set > name "%EMAIL_TO" to youremailaddress@here.com
- + Variable > Variable Set > name "%EMAIL_SUBJECT" to "SGS3 INTRUSION ATTEMPT"
- + Variable > Variable Set > name "%EMAIL_ATTACH" to "/sdcard/DCIM/Tasker/last-intruder.jpg"
- + Script > Run SL4A Script > Name (Search icon) sendemailA.py > Pass variables " %EMAIL_USER,%EMAIL_PSWD,%EMAIL_TO,%EMAIL_ATTACH,%EMAIL_SUBJECT "
- Apply
