Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Coinpilot Hyperliquid Copy Trade
v1.0.7Automate copy trading on Hyperliquid via Coinpilot to discover, investigate, and mirror top on-chain traders in real time with low execution latency. Runtime...
⭐ 3· 730·0 current·1 all-time
byAlan Ng@alannkl
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (copy‑trading on Hyperliquid via Coinpilot) matches what the skill does: it requires node, reads a local credentials JSON containing Coinpilot apiKey/userId and private keys, and performs Coinpilot/Hyperliquid calls. No unrelated credentials, binaries, or services are requested.
Instruction Scope
SKILL.md is explicit about reading a fixed local config (~/.coinpilot/coinpilot.json), never pasting secrets into chat, and only contacting allowlisted Coinpilot/Hyperliquid endpoints. It documents that write routes require private keys and instructs the user to populate them locally. The runtime instructions do not ask for unrelated file reads or exfiltration.
Install Mechanism
There is no remote install/download behavior; the skill is instruction‑first and ships a local Node script (coinpilot_cli.mjs). No external archives, shorteners, or untrusted URLs are fetched by the skill itself.
Credentials
The skill requests no environment variables but requires a local credentials JSON containing highly sensitive values (apiKey, userId, primary and follower private keys). This is proportionate to live on‑chain copy‑trading, but it is high‑sensitivity and requires user caution (the README and SKILL.md acknowledge this).
Persistence & Privilege
The skill does not request always:true or other elevated persistence. It reads/writes only the fixed per‑user credentials path under the user's home and does not attempt to modify other skills or system settings.
Assessment
This skill legitimately needs local high‑sensitivity secrets (Coinpilot API key, Privy userId, and private keys for 10 wallets) to perform live copy trading. Only install and run it in a trusted local environment where you control the credentials file (~/.coinpilot/coinpilot.json). Confirm the script's allowlist (only coinpilot domains) and that file permissions are owner‑only after you populate the JSON. Understand that the script will send private keys to Coinpilot endpoints as required for starting/stopping subscriptions — if you prefer, use small dedicated follower wallets or otherwise limit funds. Do not paste or upload your populated credentials file; follow the SKILL.md instructions exactly. If you need higher assurance, review the full coinpilot_cli.mjs source before use and consider using wallets with limited balances or hardware/key‑management isolation.scripts/coinpilot_cli.mjs:78
File read combined with network send (possible exfiltration).
About static analysis
These patterns were detected by automated regex scanning. They may be normal for skills that integrate with external APIs. Check the VirusTotal and OpenClaw results above for context-aware analysis.Like a lobster shell, security has layers — review code before you run it.
latestvk97ef9zyqzffmmpx0fb7cn6y8x82pzb3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binsnode
