USDC Krump EVVM x402 Payment

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: usdckrump Version: 0.1.2 The OpenClaw AgentSkills skill bundle 'usdckrump' is designed for making USDC Krump payments on Story Aeneid EVVM using the x402 protocol, supporting both Privy server wallets and direct private key signing. The `SKILL.md` and code clearly define its purpose and security considerations, including advice against storing private keys in plain environment variables. The `src/privy-signer.ts` component legitimately interacts with `https://auth.privy.io` for cryptographic operations, and blockchain interactions are via standard RPC endpoints. There is no evidence of intentional malicious behavior such as unauthorized data exfiltration, remote code execution, persistence, or prompt injection attempts against the agent. External repository references are for user-initiated examples, not dynamic code fetching by the skill.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If invoked with incorrect or malicious parameters, the configured signer wallet could make an irreversible payment.

Why it was flagged

The function signs and submits an on-chain payment using supplied recipient, amount, adapter, and signature parameters; no code-level approval step, spend limit, or recipient restriction is visible.

Skill content
const tx = await adapter.payViaEVVMWithX402({ from, to, ... amount, ... receiptId, evvmNonce, ... evvmSignature: evvmSig.signature }); const receipt = await tx.wait();
Recommendation

Require explicit per-payment user confirmation, verify recipient/token/adapter/RPC details, and configure Privy wallet policies or spending limits before enabling autonomous use.

What this means

Anyone who obtains these credentials or a reused private key could control or spend from the associated wallet.

Why it was flagged

The skill needs credentials that can sign wallet operations. This is purpose-aligned, but it is sensitive authority and the registry metadata lists no required env vars or primary credential.

Skill content
Set `PRIVY_APP_ID` and `PRIVY_APP_SECRET` ... For the legacy `payViaEVVM` path, the payer private key must be supplied (e.g. `AGENT_PRIVATE_KEY`).
Recommendation

Use dedicated low-balance wallets, avoid reusing private keys, prefer Privy-managed wallets with policies, and ensure credentials are declared and stored securely.

What this means

A user may execute unreviewed external code with a wallet key and move assets into an EVVM ledger.

Why it was flagged

The referenced `lz-bridge` deposit script is not present in the supplied file manifest/install spec, yet the instructions ask the user to run external repo code while exposing a payer private key.

Skill content
Run this in the full USDC Krump repo ... `cd lz-bridge` ... `PRIVATE_KEY=0x<payer_key> DEPOSIT_AMOUNT=1000000 npm run evvm:deposit-usdck`
Recommendation

Only run this from an audited repository and pinned commit, inspect the deposit script first, and use a dedicated test wallet or policy-limited signer.

What this means

Users could follow examples or trust addresses for a different token/codebase than the one they intended to use.

Why it was flagged

The evaluated skill is described as USDC Krump/USDC.k, while package and example artifacts still reference USDC.d/usdcdance naming. For a payment skill, token and contract identity ambiguity can mislead users.

Skill content
"description": "Pay with USDC.d via x402 protocol on Story Aeneid EVVM using Privy"
Recommendation

Reconcile the USDC.k versus USDC.d naming, repository links, versions, and contract addresses before using the skill for any wallet-funded operation.