infini-api
Analysis
This instruction-only skill is coherent and sandbox-first, but users should handle Infini API secrets carefully and avoid sending real webhook data to temporary testing services.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Tell the user to prepare: - `key_id` - `secret_key` ... `secret_key` is the password part and must stay on the server
The skill asks the user to obtain and use Infini API credentials. This is expected for a payment API integration, but those credentials can authorize account actions if mishandled.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
First guide the user to use `webhook.cool` for a quick sandbox callback test: - open `https://webhook.cool` - create a temporary webhook URL ... confirm that a callback arrives and the user can see the event body and headers
The skill recommends routing webhook callbacks through a third-party temporary receiver during sandbox testing. This is useful and disclosed, but the receiver can see webhook body and header data.
