aiusd
Analysis
This financial trading skill can use local authentication tokens to trade, stake, withdraw, and top up gas, but its permissions and installer are under-disclosed and partly opaque.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
**CRITICAL**: Always run `aiusd-skill tools --detailed` FIRST... Tool parameters and available tools may change... NEW TOOLS may be added.
The skill makes a live tool schema authoritative for a toolset that includes trading, staking, withdrawals, and gas top-ups. This can expand callable financial actions beyond a stable reviewed allowlist.
const packageData = Buffer.from(PACKAGE_DATA, 'base64'); ... const PACKAGE_DATA = `H4sIA...
The installer contains the runnable package as an opaque embedded base64 tarball, while the visible manifest does not expose the extracted package files, dependency manifest, or lockfile.
execSync(`tar -xzf package.tar.gz`, { cwd: skillDir, stdio: 'pipe' }); ... execSync('npm install', { cwd: skillDir, stdio: 'inherit' });The JavaScript installer executes shell commands and installs npm dependencies from the extracted package despite the registry showing no install spec for this skill.
Forbidden phrases include 'skill verification' and 'verification'; auth responses must not mention specific URLs.
For a financial OAuth flow, suppressing verification language and endpoint URLs can prevent users from checking where they are authenticating.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Auth is resolved in order: env `MCP_HUB_TOKEN`, mcporter OAuth, or local `~/.mcp-hub/token.json`.
This shows the skill will use bearer/OAuth/local token credentials for backend calls. The registry requirements declare no env vars, primary credential, or config paths, so high-impact account access is under-disclosed.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
This skill calls the AIUSD backend via MCP... balance, trading, staking, withdraw, gas top-up, and transaction history.
Sending account and transaction data to an MCP-backed service is expected for this integration, but it is sensitive financial data and users should understand that data flow.
