Kraken Exchange

WarnAudited by ClawScan on May 10, 2026.

Overview

This appears to be a real Kraken integration, but it can control real-money trading and includes a scheduled-buy example that may execute trades without a fresh confirmation.

Install only if you are comfortable giving an agent access to Kraken. Use read-only keys unless you truly need trading, verify the tentactl binary source, avoid live DCA cron automation unless you intentionally want recurring trades, and require explicit confirmation before any real-money order.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A recurring task could place real Kraken trades automatically, causing financial loss if the task is wrong, runs at the wrong time, or is forgotten.

Why it was flagged

This example creates a scheduled real-money purchase and instructs the agent to execute after validation, without including the explicit per-run confirmation required elsewhere in the safety rules.

Skill content
openclaw cron add --schedule "0 9 * * 1" --task "Buy $50 of BTC on Kraken using the kraken skill. Use validate first, then execute."
Recommendation

Do not schedule live trading unless you intentionally want recurring orders. Prefer validate-only or alert-only automation, require fresh confirmation before each live order, and keep trade amounts and API-key permissions tightly limited.

What this means

If the key is over-permissioned or mishandled, an agent or attacker could read account data and potentially place, modify, or cancel trades.

Why it was flagged

The skill tells users that authenticated trading requires Kraken API keys with order-creation permissions; this is expected for a trading integration but grants high-impact account authority.

Skill content
Trading: also enable **Create & Modify Orders**
Recommendation

Use read-only Kraken keys for market data and portfolio checks. Only enable trading permissions when needed, avoid unnecessary permissions, and consider Kraken-side restrictions such as key limits or IP allowlisting.

What this means

This is purpose-aligned, but it moves exchange secrets from a password manager into a local file that any process running as the user may be able to read.

Why it was flagged

The setup helper can reveal Kraken credentials from 1Password and store them in a local plaintext environment file, protected with chmod 600.

Skill content
op item get "$ITEM_ID" --fields label=API-key --reveal ... echo "KRAKEN_API_SECRET=$API_SECRET" >> "$ENV_FILE"; chmod 600 "$ENV_FILE"
Recommendation

Run the setup only on a trusted machine, inspect ~/.tentactl.env permissions, and remove the file when no longer needed.

What this means

A compromised or unexpected tentactl build would receive Kraken API access and could affect account data or trading actions.

Why it was flagged

The main functionality is delegated to an external binary installed from the package ecosystem or GitHub Releases; the artifact does not pin a version in the shown install command.

Skill content
cargo install tentactl
Recommendation

Install tentactl only from a trusted source, pin or record the version you reviewed, and verify release provenance before using trading keys.