Nostr Army Knife (nak)

PendingStatic analysis audit pending.

Overview

No static analysis result has been recorded yet. Pattern checks will appear here once the artifact has been analyzed.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used with your key, the agent could make public posts, upload selected files, or initiate wallet payments when asked to run these commands.

Why it was flagged

The skill documents CLI commands that can publish public content, pay a Lightning invoice, and upload a local file. These are purpose-aligned for nak, but they are state-changing actions.

Skill content
nak event -c "Hello Nostr" ...; nak wallet pay --sec <nsec> lnbc1...; nak blossom upload --server https://cdn.example.com --sec <nsec> ./image.png
Recommendation

Treat publish, upload, and wallet commands as approval-required actions; verify the relay/server, file path, invoice, and content before execution.

What this means

A secret key can let commands sign as you on Nostr and may authorize wallet operations tied to that key.

Why it was flagged

The skill expects access to a Nostr secret key for signing and related wallet actions. That is central to the purpose, but it grants authority over the user's Nostr identity and is not declared in the metadata credential fields.

Skill content
`NOSTR_SECRET_KEY`: Set this to avoid passing `--sec` every time.
Recommendation

Use a dedicated or limited key where possible, avoid exposing long-lived secret keys broadly in the environment, and only provide keys for commands you explicitly approve.

What this means

Security depends on the nak binary already present on the system or installed separately by the user.

Why it was flagged

The skill relies on an external CLI, but the provided artifacts include no install spec or reviewed binary source. The registry metadata also lists no required binaries.

Skill content
compatibility: Requires `nak` CLI (v0.15.3+ recommended).
Recommendation

Install nak only from a trusted source, verify the version, and be cautious if a local nak binary comes from an unknown path or package.

What this means

If MCP mode is enabled, another MCP client or agent may be able to access nak capabilities depending on how it is connected and configured.

Why it was flagged

The optional MCP mode exposes nak as a tool source for agent integration, but the artifact does not describe identity, access control, or data boundaries for that server.

Skill content
`nak` has an `mcp` command that starts a Model Context Protocol server. ... nak mcp
Recommendation

Only run MCP mode for trusted local clients, avoid loading broad secret-key environment variables into that session, and stop the server when it is no longer needed.