Epstein Emails (x402)
Analysis
Review before installing because the skill asks the agent to use a funded EVM wallet private key for paid API calls, while the registry metadata declares no credentials or environment variables.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Each API request costs **$0.001 USDC**... Always confirm with the user before making paid requests. Never paginate through the full dataset without explicit user approval and a cost estimate.
The API has direct financial cost per request, but the artifact instructs the agent to seek confirmation and estimate costs before paid or multi-request operations.
# pip install "x402[httpx,evm]" eth_account
The quick start references external Python packages without pinned versions; this is user-directed and purpose-aligned, but it is not captured by an install spec.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
This skill requires a funded EVM wallet to make payments... `XCLAW02_PRIVATE_KEY` ... EVM wallet private key for signing payments
The skill requires a raw private key for a funded wallet, which grants payment-signing authority; this is high-impact credential access even though it is purpose-aligned with x402 payments.
