Massive(Polygon)

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: massive-skill Version: 1.0.5 The skill is classified as suspicious due to its reliance on `npx --yes massive <command>` for execution, as documented in `SKILL.md` and all `references/*.md` files. While this is a common method for running Node.js CLI tools, it introduces a supply chain risk by downloading and executing code from the npm registry without explicit auditing of the `massive` package itself. This constitutes a risky capability (shell execution of external code) without clear malicious intent from the skill's documentation, aligning with the definition of 'suspicious' rather than 'benign' or 'malicious'.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using the skill depends on the integrity of the external npm package resolved by npx at run time.

Why it was flagged

The skill runs the external Massive CLI through npx with automatic confirmation. This is central to the skill's purpose, but the artifacts do not pin or include the npm package code being executed.

Skill content
npx --yes massive <command> [options]
Recommendation

Use only if you trust the Massive CLI package source; prefer a pinned version or reviewed package provenance when possible.

What this means

Commands may use your Massive/Polygon account access and API quota.

Why it was flagged

The skill requires a Massive/Polygon API key. This is expected for the stated market data integration, but it gives the invoked CLI access to an account credential.

Skill content
env: ["MASSIVE_API_KEY"] ... primaryEnv: "MASSIVE_API_KEY"
Recommendation

Use a scoped or dedicated API key if available, avoid sharing the key in prompts or logs, and monitor API usage.