Empire Builder

Security checks across static analysis, malware telemetry, and agentic risk

Overview

Empire Builder is a coherent crypto treasury integration, but it needs careful review because it enables live mainnet treasury/admin actions and leaves some credential/signature safeguards to the operator.

Install only if you intentionally want an agent to help operate Empire Builder on live Base/Arbitrum mainnet. Do not provide private keys to the agent, keep API keys out of URLs when possible, require manual wallet confirmation for every transaction, and verify all recipients, amounts, chains, vault addresses, and signed-message text before approving.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent-assisted transaction could spend gas or move treasury funds on Base/Arbitrum mainnet if the user signs it without checking the decoded calls.

Why it was flagged

The skill tells agents how to use API-prepared calldata for owner-signed mainnet treasury payouts. This is central to the product, but mistakes or unreviewed signing can move funds irreversibly.

Skill content
submit executeBatch on contractAddress using supplied calls or raw data — caller pays gas. Confirm chainId, vault contractAddress, and calldata match the prepare response before broadcasting.
Recommendation

Require explicit human approval before every wallet signature; decode calldata; verify chain ID, vault address, recipients, amounts, and transaction hash status before storing distributions.

What this means

A leaked API key, vague signed message, or reused signature could make unintended leaderboard/admin mutations easier if other controls do not stop it.

Why it was flagged

Write APIs depend on API keys and guardian signatures, but the docs allow API keys in query parameters and state that some signature scope/replay protections are not enforced server-side.

Skill content
x-api-key header (or api_key query) ... Message format: for leaderboard creates the backend does not enforce a specific template ... Include timestamp + nonce to reduce replay risk ... server currently does not enforce these
Recommendation

Prefer the x-api-key header over query strings, use least-privilege/rotatable keys, and only sign unique human-readable messages with explicit action, empire ID, timestamp, and nonce.

What this means

If you perform token deployment workflows, you will rely on external packages and the integrity of the copied skill documentation.

Why it was flagged

The deploy workflow may require external npm packages and a remote skill copy. The versions are pinned and verification is recommended, so this is a supply-chain note rather than a hidden install concern.

Skill content
dependencies: [clanker-sdk@4.2.16, viem@2.48.0] ... npm install clanker-sdk@4.2.16 viem@2.48.0 ... use a lockfile ... diff against a trusted checkout
Recommendation

Install only pinned versions, use a lockfile, verify the skill source against a trusted copy, and avoid @latest in automation.