Back to skill
Skillv0.1.0

VirusTotal security

ClankerKit · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 4:21 AM
Hash
89eef0daf89221ab9c4027f1e761ac140c130eed4a364f89b11475cefe766937
Source
palm
Verdict
suspicious
Code Insight
Package: clankerkit (mcp) Version: 0.2.0 Description: ClankerKit — Autonomous wallet operations for AI agents on Monad — swap, stake, deploy, trade memecoins, and manage spending policies The package `clankerkit` provides a comprehensive set of tools for autonomous wallet operations on Monad and other blockchains, primarily for AI agents. It leverages a smart contract wallet (`AgentWallet`) with a `PolicyEngine` for spending limits and access control. However, the package is classified as SUSPICIOUS due to critical security design choices and potentially misleading security claims. **Key Concerns:** 1. **Direct EOA Control and Policy Bypass:** The `AGENT_PRIVATE_KEY` is loaded directly from environment variables and used for certain high-value operations, specifically cross-chain swaps (`kyber_swap`, `zerox_swap`) and contract deployments (`deploy_policy_engine`, `deploy_agent_wallet`). These operations are executed directly by the Agent's EOA (Externally Owned Account) and *bypass* the spending limits and approval policies enforced by the `AgentWallet` smart contract. This directly contradicts the security claims in `README.md` and `SKILL.md` that state "Agent can only spend within policy limits" and "Transactions above threshold require owner approval." 2. **Powerful `execute_transaction` Tool:** The `execute_transaction` tool allows the agent to execute arbitrary contract calls with specified target, value, and calldata. While intended for flexibility, this is a highly powerful primitive that, if misused or if the underlying `AgentWallet` contract has vulnerabilities, could lead to unauthorized fund movement or contract interaction. 3. **Misleading Security Assurances:** The discrepancy between the advertised security features (policy limits, owner approval) and the actual implementation where certain operations bypass these controls via direct EOA usage could lead users to a false sense of security regarding the protection of their funds. While the code does not contain explicit malicious logic (e.g., private key exfiltration), the direct exposure and use of the `AGENT_PRIVATE_KEY` for operations outside the smart contract's policy scope significantly increases the attack surface and the risk of unauthorized fund loss if the AI agent or its execution environment is compromised.
External report
View on VirusTotal