PaySpawn — On-Chain Spending Limits for AI Agents

ReviewAudited by ClawScan on May 1, 2026.

Overview

This is a coherent payment-control skill, but it lets an agent use a scoped credential to spend USDC and relies on an external npm SDK, so users should set strict limits and verify the package.

Install this only if you intend to let an agent spend USDC. Before use, verify the @payspawn/sdk package, pin a known version, create a credential with very low daily and per-transaction limits, use recipient allowlists, choose a short expiry, keep the credential secret, and revoke or pause it when the agent no longer needs payment access.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the credential is leaked, over-scoped, or used by an agent unexpectedly, USDC can be spent up to the configured limits.

Why it was flagged

The skill uses a secret delegated spending credential that can authorize real USDC transfers until expiry or revocation. This is expected for the purpose, but it is sensitive financial authority.

Skill content
PAYSPAWN_CREDENTIAL ... authorizing the PaySpawn V5 contract to transfer USDC up to the limits you set ... Up to 1 year from creation
Recommendation

Use the lowest daily and per-transaction caps, set a short expiry, require recipient allowlists where possible, keep the credential secret, and revoke it when no longer needed.

What this means

A configured agent may pay services or recipients automatically when workflows invoke these calls.

Why it was flagged

The documented SDK calls can auto-pay x402 APIs and send direct payments. This is purpose-aligned and disclosed, but it gives an agent operational payment capability within the credential limits.

Skill content
const res = await ps.fetch("https://api.example.com/endpoint"); ... await ps.pay("0xRecipientAddress", 1.00);
Recommendation

Only enable this for agents that truly need payments, pair it with strict credential limits, and require human review for larger or non-allowlisted transactions.

What this means

Installing an unexpected or compromised package version could affect how credentials are handled or how payments are made.

Why it was flagged

The skill depends on an external npm SDK and does not pin an exact version in the documented install path. This is disclosed and central to the skill, but the SDK handles payment credentials.

Skill content
npm install @payspawn/sdk ... version: ">=5.3.0"
Recommendation

Pin a reviewed SDK version, use a lockfile, verify the npm package and linked repository, and avoid granting large spending limits to newly installed code.