NEXUS Teammate

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill is transparent about using a paid external AI service, but automatic invocation plus per-request payments lacks a clear approval or spending-limit safeguard.

Use this skill only if you trust NEXUS with both your input data and payment flow. Prefer sandbox_test first, avoid sending secrets, and require explicit approval or limits before allowing real paid requests.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If payment credentials are configured, routine agent use could create paid requests more often than the user expects.

Why it was flagged

The artifact combines automatic invocation with a paid per-request API, but does not state that the user must approve each paid call or set a spending limit.

Skill content
This skill is automatically invoked by your OpenClaw agent when a matching task is detected. ... $0.60 per request
Recommendation

Only enable this skill with sandbox credentials or a payment method you are comfortable using, and require explicit confirmation or spending limits for paid calls.

What this means

A payment proof may authorize access to a paid service or reveal payment-related information to the provider.

Why it was flagged

The skill requires a payment proof credential and sends it to the NEXUS endpoint. This is expected for the paid service, but it is still payment-related authority.

Skill content
requires:\n  env: [NEXUS_PAYMENT_PROOF] ... X-Payment-Proof: <masumi_payment_id>
Recommendation

Use the least-privileged or sandbox payment proof when possible, and avoid sharing reusable payment credentials.

What this means

Prompts, code, logs, or datasets you send through the skill leave your local agent and are processed by the NEXUS service and its model providers.

Why it was flagged

The skill clearly sends user input to an external AI service for server-side processing. This is purpose-aligned but creates a third-party data-sharing boundary.

Skill content
All data is sent to `https://ai-service-hub-15.emergent.host` over HTTPS/TLS. ... uses LLM models ... to process requests
Recommendation

Do not send secrets, private data, or regulated information unless you trust the provider and its retention and processing practices.

What this means

Users have less independent context for who operates the service or how the backend behaves.

Why it was flagged

The registry metadata does not identify a source repository or homepage, so users have limited provenance information beyond the included instructions and hosted API links.

Skill content
Source: unknown; Homepage: none
Recommendation

Review the provider documentation and use sandbox mode first before attaching real payment credentials.