Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Solana Monitor Pro

v1.0.0

Real-time Solana data monitoring with token prices, alerts via Telegram/email, whale transfers, liquidity pools, and new token discovery.

0· 19·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (price, whale, alerts via Telegram/email) align with the provided Python modules: price_monitor.py, whale_monitor.py and notifier.py implement those features. Nothing in the code tries to perform functionality unrelated to monitoring/notification.
!
Instruction Scope
SKILL.md and README instruct creating config/config.yaml or a .env with TELEGRAM_BOT_TOKEN, SMTP credentials and show CLI/python usage. However the included scripts do not parse a YAML config or load environment variables (no yaml or dotenv imports), and notifier.py expects credentials to be passed programmatically. README also documents an HTTP API (localhost:8000) that is not present in the repository. These discrepancies mean following the instructions as-written will not configure the code correctly and could cause users to put secrets in files the code doesn't actually read.
Install Mechanism
There is no install spec (instruction-only skill) and dependencies are limited to requests/python-dotenv in requirements.txt. The use of python-dotenv in requirements is not reflected in code (dotenv is never imported), so the requirements file contains at least one unnecessary dependency. No external binaries or remote downloads are used by the skill package.
!
Credentials
Registry metadata declares no required env vars or primary credential, but documentation instructs the user to supply sensitive credentials (Telegram bot token, Telegram chat id, sender_email and sender_password). Those credentials are appropriate for the features but they are not declared in metadata and the code does not automatically load them from .env/config files. That mismatch increases the chance users will mishandle secrets (e.g., paste credentials into the wrong place).
Persistence & Privilege
always:false and default agent invocation settings are used. The skill does not request persistent system-wide changes or claim to modify other skills. Risk from autonomous invocation exists as with any skill, but no elevated persistence is requested.
What to consider before installing
This package implements exactly the monitoring features it claims, but there are notable inconsistencies you should address before trusting it with secrets: - The metadata declares no required credentials, yet the README/SKILL.md ask you to provide TELEGRAM_BOT_TOKEN, TELEGRAM_CHAT_ID and SMTP credentials. Those are reasonable for notifications but the mismatch means the registry won't warn you about the required secrets. Treat those as mandatory sensitive inputs. - The code never imports dotenv or a YAML parser, but documentation instructs creating .env or config/config.yaml. That means the scripts expect credentials to be passed programmatically (e.g., NotificationManager.setup_telegram(...)) and will not automatically read the files described. Don't assume placing secrets into config/config.yaml will be used. - requirements.txt lists python-dotenv but the code doesn't use it; this is an indicator of sloppy packaging. Also README references an HTTP API (localhost:8000) and API endpoints that are not in the repository — another mismatch. - The external network endpoints contacted are public and expected for this purpose: CoinGecko (https://api.coingecko.com), Solana RPC (https://api.mainnet-beta.solana.com) and Telegram API. The code does not include any obfuscated URLs or unexpected remote download behavior. Recommendations before installing/using: - Inspect and run the code in an isolated environment (container or VM). - Do not paste credentials into global files until you confirm the code reads them where you place them. Prefer creating and passing credentials at runtime, or modify the code to load .env/config securely. - Replace the public SMTP password with an app-specific credential and restrict mailbox access; prefer a dedicated notification account. - Verify the author/source (registry owner is not a known vendor and homepage is missing). If you need guarantees, request provenance or a signed release. - If you plan to allow autonomous agent invocation with this skill, be aware the agent could use configured notification channels to exfiltrate data (e.g., send messages/emails). Ensure notification channels are dedicated and monitored. Given the coherence of functionality but multiple mismatches and packaging sloppiness, the package is suspicious rather than clearly benign. If you want a clean setup, ask the maintainer for clarified config-loading behavior and a minimal, accurate requirements file.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ftyr1j89jgeprjyaztqvcz9847g8cmonitorvk97ftyr1j89jgeprjyaztqvcz9847g8csolanavk97ftyr1j89jgeprjyaztqvcz9847g8cwhalevk97ftyr1j89jgeprjyaztqvcz9847g8c

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments