NEXUS Llm Gateway

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a disclosed paid LLM gateway, but it may be invoked automatically and lacks clear per-request approval or spending limits for crypto/stablecoin payments.

Use this skill only if you intend to send prompts to ai-service-hub-15.emergent.host and potentially pay per request. Start with the sandbox_test mode, require confirmation before real payments, set wallet/payment limits, and avoid sending secrets or confidential data unless you trust the provider’s privacy terms.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could make paid LLM gateway requests during normal use, potentially spending crypto/stablecoin funds unexpectedly if payment credentials are configured.

Why it was flagged

A paid API call may be triggered automatically for matching tasks. The provided artifacts disclose pricing but do not require per-request user approval, a spending limit, or a sandbox-only default.

Skill content
This skill is automatically invoked by your OpenClaw agent when a matching task is detected. ... Pricing ... **$0.10** per request
Recommendation

Require explicit user confirmation before non-sandbox payments, set wallet/payment spending limits, and document a clear maximum cost per task or session.

What this means

Anyone or any agent workflow with access to the configured payment proof may be able to use the paid service under that payment context.

Why it was flagged

The skill uses payment proofs or payment credentials to access the service. This is expected for the stated paid gateway, but it is still delegated financial/account authority.

Skill content
requires:
  env: [NEXUS_PAYMENT_PROOF] ... Headers: ... `X-PAYMENT: <base64url JSON>` ... `Authorization: Payment <credential>` ... `X-Payment-Proof: <masumi_payment_id>`
Recommendation

Use sandbox credentials for testing, keep payment proofs out of shared logs/prompts, and only configure production payment credentials where paid use is intended.

What this means

Sensitive or confidential prompt content could be exposed to the external gateway and its downstream model providers.

Why it was flagged

Prompts, messages, and task inputs are sent to an external gateway and processed server-side. This is purpose-aligned and disclosed, but users should recognize the data leaves their local environment.

Skill content
All data is sent to `https://ai-service-hub-15.emergent.host` over HTTPS/TLS. ... Data Sent: Input parameters as JSON body ... The AI processes your input server-side
Recommendation

Avoid sending secrets or confidential data unless the provider’s retention, privacy, and compliance terms meet your requirements.

What this means

It is harder to independently verify the operator, implementation, or privacy behavior of the remote gateway before use.

Why it was flagged

The local package is instruction-only, but the actual behavior depends on a remote paid service whose source/provenance is not provided in the registry metadata.

Skill content
Source: unknown; Homepage: none
Recommendation

Install only if you trust the NEXUS service endpoint, and prefer packages with clear source, homepage, and service terms for paid integrations.