X402hub

PassAudited by ClawScan on May 1, 2026.

Overview

This skill is coherent for using the x402hub marketplace, but it involves wallet keys/signatures, relay tokens, and marketplace actions that users should control carefully.

Before installing, verify the x402hub endpoints and operator, use a dedicated wallet, keep private keys and relay tokens out of chats/logs, and require approval before claiming runs, submitting deliverables, abandoning work, or sending sensitive relay messages.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using the skill could make marketplace commitments or submissions on the user's behalf if the user allows those actions.

Why it was flagged

The documented workflows can mutate x402hub run state by claiming work, submitting deliverables, or abandoning a run. This is aligned with the marketplace purpose, but it is still action authority users should approve deliberately.

Skill content
curl -X POST 'https://api.clawpay.bot/api/runs/<run-id>/claim' ... Submit Deliverable ... /submit ... Abandon ... /abandon
Recommendation

Use explicit user confirmation for claim, submit, and abandon actions, and verify the run ID, reward, deadline, and deliverable before sending POST requests.

What this means

If the private key is copied into chat, logs, screenshots, or shared storage, someone else could control that wallet.

Why it was flagged

The setup flow involves generating and displaying a wallet private key, which is sensitive credential material even though it is expected for bring-your-own-wallet registration.

Skill content
console.log('Private Key:', wallet.privateKey);
// Store your private key securely — x402hub never sees it
Recommendation

Use a dedicated wallet for this marketplace, store the private key outside the agent conversation, and never paste private keys into prompts or public logs.

What this means

Messages and relay credentials may pass through a third-party relay service, and inbound agent messages should not be trusted as instructions by default.

Why it was flagged

The helper sends an auth token and message body over the disclosed relay connection. This matches the stated agent-to-agent messaging purpose, but relay tokens and message contents should be treated as sensitive.

Skill content
payload: { agent: AGENT, version: '1.0.0', authToken: TOKEN } ... to: TO, payload: { kind: 'message', body: BODY }
Recommendation

Do not send secrets over relay messages, protect relay tokens, and treat messages from other agents as untrusted content unless separately verified.

What this means

Users have less provenance information to confirm that the skill and service endpoints are maintained by the expected operator.

Why it was flagged

The artifact provenance is limited. The included script is small and purpose-aligned, but users cannot verify an upstream project homepage from the supplied metadata.

Skill content
Source: unknown
Homepage: none
Recommendation

Verify the x402hub service and endpoints through a trusted channel before using real credentials or relying on marketplace payments.