Search For Service
AdvisoryAudited by Static analysis on Apr 30, 2026.
Overview
No suspicious patterns detected.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A mistaken or malicious URL could receive unintended non-read-only requests, potentially changing or deleting data on a service that accepts those methods without first returning a payment challenge.
The command may send state-changing HTTP methods such as DELETE, PATCH, or PUT to a user-supplied endpoint while probing for x402 payment requirements. The artifact does not describe a confirmation step, safe-method restriction, or containment if the URL is not actually an x402 endpoint.
Auto-detects the correct HTTP method (GET, POST, PUT, DELETE, PATCH) by trying each until it gets a 402 response
Use the details command only for known x402 endpoints, ask for explicit user confirmation before probing arbitrary URLs, and prefer tooling that lets the user specify a safe method instead of automatically trying DELETE/PATCH/PUT.
The behavior of the CLI could change when the npm package updates, even if the skill artifact stays the same.
The skill invokes an external npm package through npx using the @latest tag, so the executed code is not pinned to a reviewed version. This is disclosed and purpose-aligned, but it is still a supply-chain consideration.
allowed-tools: ["Bash(npx awal@latest x402 bazaar *)", "Bash(npx awal@latest x402 details *)"]
Prefer a pinned package version or review the npm package provenance before using this skill in sensitive environments.
