onchain contract token analysis
v1.0.0Analyze smart contracts, token mechanics, permissions, fee flows, upgradeability, market risks, and likely attack surfaces for onchain projects. Use when rev...
⭐ 0· 178·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md instructions. The skill requests no binaries, env vars, or installs and is coherent for doing contract/token security analysis.
Instruction Scope
Instructions ask the agent to infer from 'files, addresses, ABI names, deployment scripts, or docs' and to verify with live chain/explorer data when needed. That scope is appropriate for an analysis skill but broad — it implies reading any provided source artifacts and making external network queries to block explorers or nodes.
Install Mechanism
No install spec and no code files. Lowest-risk delivery model (instruction-only).
Credentials
The skill requires no environment variables or credentials up front, which is proportional. Practically, effective use may require user-provided artifacts (ABI/source), contract addresses, or read-only node/explorer API keys (e.g., Etherscan/Alchemy) supplied at runtime — the SKILL.md does not request secrets, but users may choose to provide tokens outside the skill manifest.
Persistence & Privilege
always:false and the skill is user-invocable. It does not request persistent privileges or modify other skills or system settings.
Assessment
This skill is a coherent, instruction-only analyzer — it doesn't install software or ask for credentials by itself. Before using it: only provide the contract addresses, ABIs, or source files you intend to share; do not paste private keys or wallet JSONs. If you supply node or explorer API keys, prefer read-only keys and revoke them after use. Be aware the agent may perform or request live-chain lookups (block explorer or node queries) to confirm state; if you need offline analysis, clarify that when invoking the skill.Like a lobster shell, security has layers — review code before you run it.
latestvk97ad8vb7x27j8hdm0cd3t81n982v09j
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🔍 Clawdis
