Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Axiom

v0.0.2

Use Axiom Wallet via MCP to manage payment methods, review account activity, and complete user-requested purchases with single-use payment details.

0· 44·0 current·0 all-time
byAxiom@axiom-wallet·duplicate of @bswaidner/axiom-wallet
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (Axiom Wallet via MCP) matches the runtime instructions: calls to whoami, get_payment_method, get_payment_details, create_receipt and the use of mcporter make sense for a wallet/payment integration. The skill is instruction-only (no code) which is reasonable for an API/CLI integration. Note: registry metadata in the provided bundle shows a corrupt/odd 'Required binaries' entry ([object Object]) while SKILL.md metadata correctly lists mcporter >=0.8.0 — this mismatch should be resolved.
!
Instruction Scope
The SKILL.md instructs the agent to open a headless OAuth page via mcporter and read a DOM element (data-device-auth-url) to extract an activation URL — this requires DOM parsing of an external page and careful handling of tokens/cookies. The skill also instructs the agent to visit merchant/product pages to compute final totals and capture product image URLs (og:image) for receipts. Those actions are within the payment workflow but broaden the agent's scope: browsing arbitrary merchant pages and extracting data may expose visited URLs and page content. Additionally, the get_payment_details payload includes an 'aiReasoning' field; although the doc warns not to include chain-of-thought or secrets, this field could encourage the agent to transmit internal reasoning unless strictly controlled.
Install Mechanism
No install spec — instruction-only. That is low-risk from an installation perspective: nothing is downloaded or written by the skill itself. It does require the mcporter binary to be present on the system (declared in SKILL.md metadata).
Credentials
The skill declares no required environment variables or credentials, which is proportionate. It does rely on the mcporter CLI and an OAuth session initiated at runtime rather than static credentials. Confirming the mcporter requirement is present and that no other hidden env access is performed by your agent runtime is recommended. The earlier registry metadata corruption ([object Object]) is suspicious and should be clarified (it may hide additional required binaries or env entries).
Persistence & Privilege
always:false and no install steps that persist configuration are present — good. However, the skill enables the agent to obtain single-use payment cards that charge the user's card on file. Since model invocation is allowed (default autonomous invocation), there is a real risk an autonomous agent could trigger charges if prompts or guardrails are insufficient. This is not a platform misconfiguration by itself but is a high-impact capability worth additional controls (explicit confirmations, audit logging, or disallowing autonomous invocation).
Scan Findings in Context
[no_findings] expected: The regex-based scanner found nothing. This is expected because the skill is instruction-only (SKILL.md + reference doc) and includes no code files for static analysis. Lack of findings is not evidence of safety.
What to consider before installing
Before installing: (1) Verify the mcporter binary (>=0.8.0) and confirm the MCP endpoint domain (https://mcp.useaxiom.ai) is legitimate for your org. (2) Ask the skill author to fix the registry metadata corruption ([object Object]) so required binaries/envs are explicit. (3) Restrict autonomous invocation or require explicit user confirmation before any get_payment_details call (charging the user's card). (4) Ensure the agent is instructed not to include chain-of-thought or secrets in 'aiReasoning' — prefer a short, factual human-readable reason. (5) If you need higher assurance, request a provenance review (who published the skill) or run it in a limited/test account before granting it access to real payment flows.

Like a lobster shell, security has layers — review code before you run it.

latestvk976xg2cvxb7245nyht28zx01x84261a

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Bins[object Object]

Comments