Structs Guild Stack

ReviewAudited by ClawScan on May 14, 2026.

Overview

The skill is coherent and safety-aware, but it asks you to run a persistent external Docker stack with optional MCP and transaction-signing components, so you should review and keep it scoped.

This appears safe to use as a read-only local indexing stack if you are comfortable running Docker services. Before installing, clone only the intended repository, choose a specific release tag, review the Compose file, start only the read-only services by default, and do not enable MCP or transaction signing unless you understand their permissions.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

What actually runs on your machine depends on the external repository and chosen release tag.

Why it was flagged

The setup runs an upstream Docker Compose project that is not included in the reviewed artifact set. The skill mitigates this by telling users to pin a release tag and review the compose file.

Skill content
git clone https://github.com/playstructs/docker-structs-guild ... git checkout <latest-tag>
Recommendation

Use a specific trusted release tag, inspect docker-compose.yml and image sources before starting services, and avoid tracking main unless actively developing.

What this means

Starting the stack can download and run container images locally.

Why it was flagged

The core workflow executes Docker containers. This is expected for a Docker-based local node/database stack, but it is still local code execution.

Skill content
docker compose up -d structsd structs-pg structs-grass
Recommendation

Run it only in an environment where Docker workloads are acceptable, and review the compose file and images first.

What this means

The node, PostgreSQL, and event services may keep consuming resources and exposing local ports after setup finishes.

Why it was flagged

The skill explicitly discloses persistent background services. This persistence is purpose-aligned but important for users to understand.

Skill content
"Starts a background fleet of containers. They keep running after this command returns."
Recommendation

Monitor running containers and stop them with Docker Compose when not needed.

What this means

If enabled and configured with keys, the signing agent could authorize game/blockchain transactions.

Why it was flagged

The stack includes an optional transaction-signing component that could use wallet keys if enabled. The artifact clearly warns users and keeps it out of the recommended read-only default.

Skill content
Transaction signing agent — only started when you opt in. "Do not configure with keys until you have read its code and understood what it will sign on your behalf."
Recommendation

Leave the signing agent disabled unless necessary, review its code first, and use tightly scoped or low-risk keys where possible.

What this means

If exposed beyond localhost, other processes or network users might interact with the stack through MCP.

Why it was flagged

An optional MCP server is available for agent/tool communication. The skill appropriately advises local-only binding and opt-in use.

Skill content
MCP server (port 3000) — only started when you opt in. Bind to 127.0.0.1 in your Compose override.
Recommendation

Keep MCP disabled unless needed and bind it to 127.0.0.1 rather than a public interface.

What this means

Malicious or misleading player-controlled text could influence an agent if treated as trusted instructions.

Why it was flagged

Database results may contain player-controlled content that an agent could later read or summarize. The skill explicitly warns that these fields remain untrusted.

Skill content
Adversarial UGC in PG reads — player names, pfps, guild endpoints stored in the database are still untrusted input.
Recommendation

Treat database values as data only, not instructions, and sanitize or quote untrusted fields when using them in prompts.