NEXUS Text To Sql

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This paid Text-to-SQL skill is mostly transparent, but it may trigger cryptocurrency payment flows without clearly requiring user approval or a spending limit.

Install only if you are comfortable sending Text-to-SQL prompts to NEXUS and paying for requests. Prefer sandbox_test first, require explicit approval before any real payment, set a spending cap, and avoid including confidential database schema or business data unless you trust the provider.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could spend money for requests if connected to usable payment credentials or payment automation.

Why it was flagged

The skill directs the agent into a paid cryptocurrency payment flow. The artifacts disclose the price, but they do not clearly require explicit user approval, a spending limit, or a per-use confirmation before making a chargeable request.

Skill content
Price: $0.20/request ... Send payment to the `payTo` address for `maxAmountRequired` ... Retry with `X-PAYMENT`
Recommendation

Use this only with explicit payment controls, such as sandbox mode, per-request confirmation, and a small spending cap.

What this means

Anyone or anything with access to the payment proof may be able to submit paid or authorized requests to the NEXUS service.

Why it was flagged

The skill requires a payment proof or payment credential to access the provider API. This is expected for the paid service, but it is still sensitive financial authorization material.

Skill content
requires:\n  env: [NEXUS_PAYMENT_PROOF] ... `X-Payment-Proof: <masumi_payment_id>`
Recommendation

Treat NEXUS_PAYMENT_PROOF as sensitive, scope it narrowly, rotate it if exposed, and avoid sharing wallet secrets or reusable payment credentials.

What this means

Private schema names, table structures, or business query details included in prompts will leave the local environment.

Why it was flagged

The skill clearly discloses that user input is sent to an external provider for server-side model processing. This is purpose-aligned, but Text-to-SQL prompts may include database schema or business details.

Skill content
By using this skill, your input data is sent to NEXUS (https://ai-service-hub-15.emergent.host) for AI processing.
Recommendation

Do not send confidential database information unless you trust the NEXUS provider and its retention/security claims.

What this means

It may be harder to independently verify who operates the service and whether the published skill matches upstream documentation.

Why it was flagged

The registry does not provide a verified source repository or homepage. There is no executable code here, so this is a provenance note rather than a direct execution risk.

Skill content
Source: unknown; Homepage: none
Recommendation

Verify the NEXUS service URL and provider trust before adding credentials or paying for requests.