Bondterminal X402

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill is coherent for paid BondTerminal API queries, but it asks users to configure a funded EVM private key and supports automatic per-request payments without clear spending controls.

Only install this if you are comfortable using x402 paid API calls. Use a dedicated low-balance wallet, confirm each paid request, cap spending, and pin/review the npm dependencies before exposing any private key or signer.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this workflow could spend USDC repeatedly while answering bond-data questions, even if each individual request is only $0.01.

Why it was flagged

The skill explicitly supports automatically turning a 402 response into a signed payment and retrying the request, but it does not specify user confirmation, spending caps, payTo validation, or retry limits.

Skill content
Supports automatic 402 → payment → retry.
Recommendation

Require explicit user approval before paid calls, verify the amount, network, asset, and payee before signing, and set a maximum spend or request count per task.

What this means

If the environment or dependencies are misused or compromised, the funded wallet could be used for payments beyond the user's intended query.

Why it was flagged

The skill asks users to make a funded wallet private key available for signing. That is high-impact credential access because the key can authorize USDC transfers, and the skill metadata declares no primary credential or required environment variable.

Skill content
export X402_PRIVATE_KEY=0x...  # EVM private key with USDC on Base
Recommendation

Use a dedicated low-balance wallet, avoid raw private keys where possible, prefer hardware/KMS signers with policy controls, and declare the credential requirement clearly in metadata.

What this means

Installing unpinned packages can expose the user to unexpected package updates in code that interacts with a funded signer.

Why it was flagged

The setup depends on third-party npm packages without pinned versions. This is expected for the x402/viem integration, but users should understand that these packages will handle wallet signing flows.

Skill content
npm install @x402/core @x402/evm viem
Recommendation

Pin package versions, install from trusted registries, and review dependency changes before using the signer.