Back to skill
v0.1.0

AI Walllet Payment System

ReviewClawScan verdict for this skill. Analyzed May 1, 2026, 5:42 AM.

Analysis

This skill is a crypto-wallet/payment tool that can manage private keys and send ETH, and its artifacts include high-impact financial authority plus overstated security claims that users should review carefully.

GuidanceInstall only if you understand that this is experimental wallet software. Do not connect valuable wallets or fund it with significant ETH unless the exact code has been audited, transaction approval controls are enforced, and secrets are kept out of agent logs and chat history.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

Abnormal behavior control

Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.

Tool Misuse and Exploitation
SeverityHighConfidenceHighStatusConcern
SKILL.md
- Performs secure ETH transactions via Web3
- AI agents that need to make automated payments

The skill explicitly enables an agent workflow for sending cryptocurrency transactions, which can move real funds and is not easily reversible.

User impactIf misconfigured or invoked under the wrong instruction, the agent could help send ETH from a funded wallet.
RecommendationUse only with testnet or small balances unless independently audited; require explicit human approval, amount limits, and recipient allowlists for every transaction.
Agentic Supply Chain Vulnerabilities
SeverityLowConfidenceHighStatusNote
SKILL.md
git clone https://github.com/cerbug45/AI-Wallet-Payment-System.git
...
pip install -r requirements.txt

The setup relies on cloning an external repository and installing Python dependencies; this is disclosed and purpose-aligned, but provenance matters for wallet software.

User impactInstalling unreviewed wallet code or dependencies can expose private keys or funds if the upstream source changes or is compromised.
RecommendationReview the exact repository revision before use, verify dependencies, and avoid installing or running it in an environment containing valuable credentials.
Human-Agent Trust Exploitation
SeverityHighConfidenceHighStatusConcern
README.md
The code header lists 500+ security features. In reality, it implements a subset of core security practices. Many advanced features (HSM, quantum cryptography, TPM, etc.) are mentioned but not actually implemented.

The project itself acknowledges that prominent security claims are overstated compared with the implemented protections.

User impactA user may overtrust the tool's security and use it with real funds despite unsupported claims about protections.
RecommendationTreat the tool as experimental, not production-grade; rely on the README disclaimer rather than the marketing-style security claims, and seek an independent security audit before storing real value.
Permission boundary

Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.

Identity and Privilege Abuse
SeverityHighConfidenceHighStatusConcern
SKILL.md
master_password = getpass.getpass("Enter master password: ")
api = MaximumSecurityPaymentAPI(master_password)
...
print(f"   🔑 Backup codes: {wallet['backup_codes']}")

The skill handles a master password, wallet secrets, and backup codes, which are equivalent to high-value financial credentials.

User impactCompromise or misuse of these secrets could lead to loss of wallet access or loss of funds.
RecommendationDo not use with valuable wallets unless the code and operational model are audited; store secrets in a dedicated password manager or hardware wallet workflow, and avoid exposing backup codes to agent logs or chat transcripts.