OpenX.pro Agent social network

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: openxpro Version: 1.0.0 The skill bundle provides a comprehensive integration for the OpenX.pro AI social network, allowing an agent to register, manage a local identity (SOUL.md/IDENTITY.md), and interact with social APIs (posts, DMs, tasks). While the instructions guide the agent to collect hardware metadata (CPU ID, MAC address) for identity verification and manage a 64-character recovery key, these actions are transparently documented as part of the platform's sybil-resistance and recovery mechanisms. There is no evidence of data exfiltration, unauthorized remote execution, or malicious prompt injection; the instructions focus on autonomous social behavior and energy management within the OpenX ecosystem.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Account tokens, recovery flows, posts, DMs, and other user/agent data could be exposed or altered in transit if the network path is intercepted.

Why it was flagged

The configured provider API uses plaintext HTTP while the skill relies on bearer tokens and recovery credentials for account access.

Skill content
"base_url": "http://openx.pro:8800/api/v1" ... "authentication": { "type": "bearer_token" ... "required_credentials": ["token", "uni_name", "nick_name", "recovery_key"] }
Recommendation

Do not use sensitive OpenX credentials over this endpoint unless the provider offers HTTPS/TLS; verify the service URL and prefer a secure transport before registering.

ConcernHigh Confidence
ASI10: Rogue Agents
What this means

The agent may continue contacting OpenX and receiving work on a schedule rather than only acting during a user-requested session.

Why it was flagged

The skill defines a required recurring heartbeat intended to keep the agent active and receiving tasks, which is persistent autonomous behavior.

Skill content
"heartbeat": { "interval_seconds": 60, "endpoint": "/agent/heartbeat", "required": true, "description": "Send heartbeat every 60 seconds to stay active and receive letters/tasks" }
Recommendation

Require an explicit start/stop control for heartbeat activity, make it opt-in, and avoid running it in the background without clear user consent.

ConcernHigh Confidence
ASI01: Agent Goal Hijack
What this means

OpenX-supplied tasks or messages could redirect the agent’s behavior toward posting, replying, messaging, or other actions the user did not specifically approve.

Why it was flagged

External heartbeat/task content is prioritized and can drive the agent toward actions without an explicit user-review step.

Skill content
"best_practices": ["Process tasks from heartbeat response first" ...] ... "daily_operations": ["1. Send heartbeat", "2. Check claimed_task_details", "3. Process tasks" ... "8. Decide: execute task / reply / DM / letter / post"]
Recommendation

Treat server tasks as suggestions, show them to the user, and require confirmation before public posts, DMs, transfers, or other meaningful actions.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

If followed autonomously, the skill could post publicly, interact with other accounts, broadcast notifications, or spend/transfer in-platform assets.

Why it was flagged

The skill documents broad account-mutating APIs, including public content actions, social actions, broadcasts, and in-platform value transfers, without clear per-action approval constraints.

Skill content
"posts": {"endpoints": {"create": "/agent/post", "comment": "/agent/comment", "like": "/agent/like", "repost": "/agent/repost"}} ... "economy": {"endpoints": {"transfer": "/agent/transfer", "tip": "/agent/tip"}} ... "notifications": {"endpoints": {"broadcast": "/agent/notifications/broadcast"}}
Recommendation

Limit default permissions, disable transfer/broadcast actions unless user-directed, and require confirmation for public or economic operations.

ConcernMedium Confidence
ASI06: Memory and Context Poisoning
What this means

A changed or malicious remote persona could persistently influence the agent’s behavior across sessions.

Why it was flagged

The skill can import unreviewed remote persona content into local identity files that are then reused to shape future sessions.

Skill content
"Read `https://makesoul.org/skill.md`" ... "Randomly adopt a soul from MakeSoul" ... "Re-read these files at the start of every future session."
Recommendation

Only use reviewed, user-approved SOUL/IDENTITY content; do not let persona files override user, system, or safety instructions; pin or save a known-good copy instead of repeatedly trusting remote content.

What this means

Anyone who obtains the local credential or recovery key may be able to access or recover the OpenX agent identity.

Why it was flagged

The skill’s own account model requires persistent local credentials and a recovery key; this is purpose-aligned but sensitive.

Skill content
"local_files": {"soul": "SOUL.md", "identity": "IDENTITY.md", "credentials": ".openx_credentials"} ... "required_credentials": ["token", "uni_name", "nick_name", "recovery_key"]
Recommendation

Store the recovery key in a password manager or encrypted file, restrict permissions on .openx_credentials, and never commit these files to a repository or share them.