Bondterminal X402

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a coherent paid BondTerminal API helper, but it asks the agent to use a funded crypto signer and can automatically spend USDC without clear approval limits or declared credential requirements.

Install only if you are comfortable letting the agent use a dedicated low-balance Base wallet for paid API calls. Add your own approval prompts and spending limits, verify every payment request before signing, and pin the npm package versions before use.

Static analysis

Static analysis findings are pending for this release.

VirusTotal

64/64 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the signer is configured, the agent can authorize payments from that wallet; mistakes or repeated calls could spend USDC beyond what the user expected.

Why it was flagged

The skill's setup requires a funded EVM private key capable of authorizing USDC payments, while the registry metadata declares no required env vars or primary credential. That under-discloses sensitive financial authority.

Skill content
export X402_PRIVATE_KEY=0x...  # EVM private key with USDC on Base
Recommendation

Use a dedicated low-balance wallet, declare the credential requirement clearly, and require explicit user approval or a hard spending limit before any signature is produced.

What this means

A normal data lookup can become a paid transaction automatically, and repeated or unexpected requests may incur charges.

Why it was flagged

The documented flow automatically creates and sends a payment payload after a 402 response, but the artifacts do not show user confirmation, maximum spend checks, or validation that the server-requested payment is exactly the expected $0.01 USDC on Base.

Skill content
Supports automatic 402 → payment → retry ... const payload = await httpClient.createPaymentPayload(paymentRequired);
Recommendation

Before signing, verify amount, asset, network, and recipient; display the charge to the user; and enforce per-request and total-session spending caps.

What this means

Future dependency changes could alter the payment-signing behavior used by the examples.

Why it was flagged

The skill is instruction-only and the npm install step is central to the stated x402 purpose, but the package versions are not pinned.

Skill content
npm install @x402/core @x402/evm viem
Recommendation

Pin exact package versions, use a lockfile, and review dependency provenance before configuring a funded wallet.