Bob P2P - Beta

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill is coherent for a crypto API marketplace, but it asks for full Solana wallet authority and can automatically spend tokens through remote marketplace endpoints without clearly bounded controls.

Install only if you understand this is a crypto-wallet client. Use a new wallet with minimal $BOB/SOL, verify the aggregator endpoint, inspect the code and npm dependencies, avoid sending secrets in API requests, and require explicit approval before any paid API call.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone or any process that can read or use that config could spend from the configured wallet, not just call the intended Bob APIs.

Why it was flagged

The setup flow asks for the user's full wallet secret or mnemonic and writes it into a persistent config file, while the registry metadata declares no primary credential.

Skill content
echo "Private key (will be visible - mnemonic or key):"
read -p "> " PRIVATE_KEY
...
"privateKey": "$PRIVATE_KEY"
Recommendation

Use a dedicated low-balance wallet only, never a main wallet mnemonic; the skill should declare this credential, store it with hardened permissions, and preferably support scoped signing or spending limits.

What this means

An agent or user action that calls an API can spend $BOB tokens and SOL transaction fees, and blockchain payments are generally irreversible.

Why it was flagged

The documented API-call path performs a token payment automatically as part of execution, with no clearly documented confirmation prompt, max-spend limit, or allowlist.

Skill content
The script will:
1. Request a queue position
2. Send $BOB payment automatically
3. Execute the API
Recommendation

Require explicit user confirmation before each payment, show provider wallet and total cost before signing, and add configurable spend limits.

What this means

Requests and payment-routing decisions depend on remote marketplace infrastructure whose identity and integrity are not clearly bounded in the artifacts.

Why it was flagged

The paid call flow trusts a remote aggregator response to supply the provider endpoint and payment wallet; the docs/config examples also show inconsistent aggregator defaults, including HTTP endpoints.

Skill content
API_INFO=$(curl -s "$AGGREGATOR/api/$API_ID" 2>/dev/null)
PROVIDER_WALLET=$(echo "$API_INFO" ...)
node src/cli/consumer-execute.js ... --provider-wallet "$PROVIDER_WALLET"
Recommendation

Use only verified HTTPS aggregator endpoints, document which aggregator is authoritative, and verify/sign provider listings before using them for payments.

What this means

Installing the skill depends on npm package integrity and the user's trust in the bundled client source.

Why it was flagged

The setup script installs npm dependencies for the local client; this is expected for a Node-based P2P client but means external package code is trusted during setup.

Skill content
npm install --silent 2>/dev/null || npm install
Recommendation

Review the source, prefer a lockfile or pinned dependency versions, and declare Node/npm requirements in metadata.

What this means

If provider mode is enabled, the machine may expose a service and process jobs beyond a one-off command.

Why it was flagged

Provider mode is optional and purpose-aligned, but it creates a long-running service that registers with aggregators and handles external requests.

Skill content
This will:
1. Start the provider server
2. Register APIs with configured aggregators
3. Begin accepting and processing requests
Recommendation

Only enable provider mode intentionally, bind it to a safe interface, use rate limits, and stop it when not needed.