Locus

WarnAudited by ClawScan on May 10, 2026.

Overview

Locus appears purpose-built for crypto payments, but it gives an agent persistent wallet/payment authority with dynamic tools, including token approvals, so it needs Review before use.

Install only if you intentionally want your agent connected to a crypto wallet. Use a low-limit or restricted Locus API key, verify every recipient, amount, token, memo, and allowance change, and do not rely on email content alone as proof that a payment is legitimate.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken or overbroad tool call could initiate irreversible crypto transfers or risky token allowance changes if the user approves without careful review.

Why it was flagged

The agent is instructed to invoke dynamically discovered MCP tools, while the skill purpose includes sending payments and approving token spending. The artifacts do not clearly bound what tools may appear or require confirmation for every high-impact wallet mutation.

Skill content
Tools are dynamic — each user gets different tools based on their permission group... Call any discovered tool: mcporter call locus.<tool_name>...
Recommendation

Require explicit confirmation for every wallet-changing action, including token approvals and batch sends; review the tool schema each time; use whitelists, low limits, and server-side spending caps.

What this means

Anyone or any agent workflow that can use this configuration may be able to act within the key's wallet permission group, potentially causing financial loss.

Why it was flagged

The skill asks for a wallet-linked bearer credential and stores it in a home-scoped mcporter configuration, granting ongoing delegated authority to payment tools.

Skill content
You'll need a Locus API key to connect your wallet... each key is tied to your wallet and permission group... --header "Authorization=Bearer <API_KEY>" --scope home
Recommendation

Use a dedicated low-privilege Locus key, enforce transaction limits and whitelisted recipients, protect the mcporter config, and revoke the key immediately if it is no longer needed.

What this means

The local environment will trust whatever mcporter package/version npm resolves at install time.

Why it was flagged

The setup script can install the mcporter package globally from npm without a pinned version. This is purpose-aligned, but it adds external package trust.

Skill content
if ! command -v mcporter &>/dev/null; then ... npm i -g mcporter
Recommendation

Install mcporter from a verified source, consider pinning a known-good version, and avoid running setup from an untrusted workspace.

What this means

Payment parameters, wallet-context requests, and authorization data are handled by the external Locus MCP service.

Why it was flagged

The skill routes tool discovery and payment-related calls through a remote MCP provider using the user's authorization token. This is expected for the integration, but the remote tool boundary and permissions are not inspectable in the artifacts.

Skill content
mcporter config add locus --url "https://mcp.paywithlocus.com/mcp" --header "Authorization=Bearer <API_KEY>"
Recommendation

Only use this with a Locus account and permission group you trust, and verify the provider's privacy, logging, and key-revocation controls.