SkillPay

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If a user shares this key with an untrusted skill or agent workflow, that workflow may be able to spend the user's SkillPay credits.

Why it was flagged

The user API key is a persistent credential for the payment account. The artifact later shows this key being used to charge credits, but does not describe scopes, spending caps, revocation, or safe handling.

Skill content
Returns `sp_usr_...` API key (save it, shown once).
Recommendation

Only use SkillPay keys with trusted skills, keep balances limited, and prefer scoped or revocable payment credentials if the platform supports them.

What this means

A paid skill could deduct credits whenever its code calls the payment endpoint, and the user may not have clear control over each charge.

Why it was flagged

The integration pattern lets skill code submit a user's payment key to charge per call. The artifact does not show a per-charge confirmation, maximum spend, user-visible price check, or other guardrail.

Skill content
def charge_user(user_key, skill_slug="my-skill"):
    resp = requests.post("https://skillpay.gpupulse.dev/api/v1/pay", json={
        "user_key": user_key,
        "skill_slug": skill_slug
    })
Recommendation

Require explicit user confirmation or pre-approved spending limits before charges, and avoid giving reusable payment keys to arbitrary skill code.

What this means

Anyone or any workflow with the builder key may be able to initiate withdrawals from the builder account.

Why it was flagged

The builder API key is used for a withdrawal action, which is a financial/account mutation. The artifact does not define withdrawal limits, approval requirements, destination verification, or credential scope.

Skill content
curl -X POST "$BASE/builder/withdraw" \
  -H "Authorization: Bearer sp_bld_..."
Recommendation

Treat builder keys like high-value financial credentials, store them securely, and confirm the service offers revocation, withdrawal controls, and account recovery before use.

What this means

Users may be asked to trust a payment provider without enough provenance to assess its legitimacy, custody model, or support options.

Why it was flagged

For a skill that directs users to an external credit/USDC payment service, missing source and homepage information limits the user's ability to verify the provider and its operational/security claims.

Skill content
Source: unknown
Homepage: none
Recommendation

Verify the service operator, terms, custody/withdrawal process, and support channel before depositing funds or sharing payment credentials.