Einstein x402 Blockchain Analytics

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill is coherent for paid blockchain analytics, but it handles a wallet private key and signs server-defined USDC payment requests without clear local spending or recipient enforcement.

Install only if you are comfortable giving this skill access to a dedicated, low-balance wallet private key for paid x402 queries. Avoid auto-confirm or --yes, review each payment amount, and do not store the key in config.json unless file permissions are tightly restricted.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A compromised, misconfigured, or unexpected payment endpoint could request a larger or different transfer than the user expected, and the wallet key would sign that exact authorization.

Why it was flagged

The payment authorization is built from values supplied by the remote 402 challenge, including amount, recipient, and token contract. The provided artifacts do not show local enforcement that these match the advertised service price range, USDC on Base, or an expected Einstein recipient before signing.

Skill content
const amount = requirement.maxAmountRequired || requirement.amount || '0'; ... to: getAddress(requirement.payTo) ... const verifyingContract = getAddress(requirement.asset); ... const signature = await account.signTypedData({
Recommendation

Use only a dedicated low-balance wallet. The skill should enforce a maximum per-query price, expected USDC contract/network, expected recipient, and require visible confirmation of the actual challenge amount before signing.

What this means

If confirmation bypass is used, an agent or script could spend USDC on repeated analytics calls without asking each time.

Why it was flagged

The CLI supports bypassing the payment confirmation prompt for paid queries. This is disclosed and useful for automation, but risky when an agent can run commands without close user supervision.

Skill content
--yes / -y              Skip payment confirmation prompt
Recommendation

Do not use --yes, -y, or auto-confirm settings unless you have strict spending controls and a low-balance dedicated wallet.

What this means

Anyone who can read that config file could control the funded wallet used for payments.

Why it was flagged

The setup wizard can persist the wallet private key in a local config file. The artifact warns the user, but plaintext storage of a private key is still sensitive.

Skill content
writeFileSync(CONFIG_PATH, JSON.stringify(config, null, 2) + '\n', 'utf-8'); ... IMPORTANT: Add config.json to .gitignore — it contains your private key!
Recommendation

Prefer an environment variable or a dedicated wallet with minimal funds. If config.json is used, restrict file permissions and ensure it is never committed or shared.

What this means

The installed viem package version may differ over time, which can affect reproducibility and supply-chain review.

Why it was flagged

The manual npm install resolves a version range rather than a pinned dependency or lockfile in the supplied artifacts.

Skill content
"dependencies": { "viem": "^2.0.0" }
Recommendation

Install from a trusted source and prefer a lockfile or pinned dependency versions for repeatable installs.