Exposed secret literal
- Finding
- File appears to expose a hardcoded API secret or token.
Security checks across static analysis, malware telemetry, and agentic risk
The skill is mostly aligned with Solana frontend development, but it includes autonomous Helius signup, payment, upgrade, and persistent credential workflows that deserve review before use.
Before installing, verify the Helius MCP package source, avoid unpinned installs if possible, and do not allow the agent to run signup, upgrade, renewal, or payment tools unless you explicitly approve the exact amount and plan. Also review where Helius API keys, JWTs, and the local Solana keypair will be stored and how to delete or revoke them later.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
An agent following this guidance could create or modify a Helius account and spend USDC if the MCP tools and funded wallet are available.
The skill documents payment-capable MCP tools and describes an autonomous flow, but the provided text does not clearly require explicit final user approval before signup, upgrade, or renewal payments.
The fully autonomous signup flow, no browser needed ... `agenticSignup` — creates the account, processes USDC payment ... `upgradePlan` — executes the upgrade, processes USDC payment ... `payRenewal` ... processes the USDC payment.
Require explicit user confirmation before any signup, upgrade, renewal, or payment step; show the plan, amount, wallet, and irreversible effects before proceeding.
Future MCP or CLI sessions may retain access to the user's Helius account and local signup wallet without the user re-entering credentials.
Persistent API keys, JWTs, and a Solana keypair provide continuing account authority and are broader than the registry's declared credential/config requirements.
The MCP persists API keys and JWTs to shared config files so they survive across sessions ... Keypair: saved to `~/.helius-cli/keypair.json` ... JWT: saved to shared config for authenticated session features.
Document the exact credential paths, provide clear cleanup/revocation instructions, and tell users how to remove stored API keys, JWTs, and keypairs after setup.
The installed MCP server version may change over time, and the user is trusting code retrieved from npm during setup.
Installing an MCP server via an unpinned `@latest` npm package is a normal integration setup step here, but it leaves the installed code version and provenance dependent on the package registry at install time.
claude mcp add helius npx helius-mcp@latest
Verify the MCP package publisher and consider pinning a known-good version instead of using `@latest`.