Iseclaw Intel

v1.2.0

Indonesian Web3 intelligence via Iseclaw ACP agent. Real-time market data, token signals, TGE research, and GameFi analysis from Southeast Asia's first trans...

1· 330·1 current·1 all-time
byDuraku@0xduraku
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (Indonesian Web3 intelligence) match the runtime instructions: the SKILL.md points to market-pulse, watchlist, TGE calendar endpoints and ACP hiring for paid research. There are no requests for unrelated resources or credentials.
Instruction Scope
The instructions tell the agent to fetch data from api.zerovantclaw.xyz and to hire via ACP (agdp.io). This is expected for a data/agent service, but it does send queries to third-party endpoints — ensure you trust that domain and avoid pasting secrets or private keys in requests.
Install Mechanism
No install spec and no code files — lowest risk: the skill will not write files or install packages on the host. Runtime behavior is limited to issuing HTTP requests per the SKILL.md.
Credentials
No environment variables, credentials, or config paths are requested. The published ACP wallet address is informational and expected for paid services.
Persistence & Privilege
Skill does not request always:true, does not modify other skills or system settings, and has no autonomous persistence requirements beyond normal agent invocation.
Assessment
This skill is internally consistent and doesn't ask for credentials or install code, but it relies on third-party APIs (api.zerovantclaw.xyz) and an ACP hire flow. Only use it if you trust that service provider. Never paste private keys, wallet seed phrases, or other secrets into queries. If you plan to pay for deep research, verify the ACP profile and wallet externally (e.g., on the ACP marketplace) before sending funds. If you need stronger assurance, ask the publisher for a homepage or code repo, or test the skill with non-sensitive queries first.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ayv5442wxe0454nmvyhtn1x820h4s

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments