Back to skill
Skillv1.0.1

ClawScan security

PayAll CLI · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousMar 27, 2026, 1:12 AM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill’s instructions match a Payall CLI tool, but it encourages storing and passing extremely sensitive secrets (EVM private keys, full card PAN/CVV) and recommends installing an unverified npm package — reasonable for the claimed purpose but security-sensitive and worth caution.
Guidance
This skill appears to be what it says, but it handles very sensitive secrets and recommends installing an unverified npm package. Before installing or using it: 1) Verify the payall-cli package source (GitHub repo, maintainer, package contents) and audit the code if possible; 2) Do not pass your EVM private key on the command line to agents or automation; prefer hardware wallets or signed transactions when possible; 3) If you must use a private key, inspect how ~/.payall/ is protected and whether the claimed AES-256-GCM encryption and key management are implemented correctly; 4) Avoid using the --key auto-save option for long-term storage or in automated agents without strict isolation; 5) Treat any command that returns full card PAN/CVV JSON carefully and ensure it is used only in a secure, ephemeral context; 6) Consider running the CLI in a sandbox or VM and limit network access until you’ve validated telemetry/backend endpoints. If you want, I can list concrete checks to validate the npm package and the on-disk credential format.

Review Dimensions

Purpose & Capability
okThe name/description align with the runtime instructions: the SKILL.md documents running a payall CLI to manage crypto cards, view balances, top up with USDT, apply for cards, and perform wallet operations. Required capabilities are consistent with those actions.
Instruction Scope
concernThe instructions explicitly instruct non-interactive use by passing --key <private_key> and saving the private key to disk (AES-256-GCM encrypted at ~/.payall/). They also provide a --reveal --json output that returns full card PAN/CVV/billing data. Both behaviors are within the stated purpose but involve highly sensitive secrets and persistent local storage — agents could be asked to provide private keys on the command line or to access/reveal full card data, which raises data-exfiltration and persistence risks.
Install Mechanism
noteThe skill is instruction-only (no install spec), but SKILL.md tells users/agents to run 'npm install -g payall-cli' or 'bun install -g payall-cli'. Installing an unverified npm package is a supply-chain risk; the skill does not provide a homepage, repository, or verified source to validate the package before installation.
Credentials
noteThe skill declares no environment variables, which is coherent, but it requires handling extremely sensitive secrets (EVM private key, full card PAN/CVV). Requesting a private key is proportionate to wallet operations, but the guidance to auto-save keys for agent use increases risk and should be treated as a high-sensitivity requirement.
Persistence & Privilege
notealways is false and the skill does not request elevated platform privileges. However, the CLI's behavior of persisting encrypted credentials at ~/.payall/ and allowing auto-save via --key means secrets may persist on disk; that persistence is a security concern even if operationally justified.