Back to skill
Skillv2.0.0

ClawScan security

NadName Agent Β· ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousFeb 11, 2026, 9:26 AM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill mostly matches its stated purpose (registering .nad names) but contains inconsistencies and risky implementation details you should review before using (notably undeclared PRIVATE_KEY usage, local keystore creation, and a pre-scan prompt-injection signal).
Guidance
This package appears to implement the advertised NNS registration flows, but there are a few red flags you should consider before running it: 1) The code expects a PRIVATE_KEY (or managed keystore) but the skill metadata did not declare thatβ€”treat that as a transparency issue. 2) The scripts create files under ~/.nadname and may print or save your mnemonic/private key; only run if you are comfortable with that behavior and have inspected the code. 3) The pre-scan found unicode control characters in the documentationβ€”review SKILL.md as plain text to ensure no hidden instructions. Practical safety steps: run the code in an isolated environment (throwaway VM or container), use a throwaway wallet with minimal funds for testing, inspect the full register-name.js file (verify API endpoints and that signatures/transactions are constructed as expected), and don't provide your main wallet's private key until you fully audit the code. If you need higher assurance, ask the publisher for a verifiable source repository or signed release; absence of a homepage/source URL reduces confidence.
Findings
[unicode-control-chars] unexpected: A pre-scan detected unicode-control characters in SKILL.md, which can be used for prompt-injection or to obfuscate content. This is not expected for documentation and should be inspected; presence does not prove maliciousness but reduces transparency.

Review Dimensions

Purpose & Capability
noteThe name/description (register .nad names via NNS) matches the included scripts and API/contract calls. However, the skill metadata declares no required environment variables while the runtime docs and scripts depend on a PRIVATE_KEY environment variable (or managed keystore). That mismatch between declared requirements and the actual runtime expectations is an incoherence users should notice.
Instruction Scope
noteSKILL.md and the scripts instruct only the operations needed to check availability, register names, and list owned names. They also instruct creating and storing an encrypted keystore under ~/.nadname and optionally printing/saving the mnemonic. Those file and console actions are within the domain of a wallet/registration tool, but printing the mnemonic to the console and offering to save it (even encrypted) expands the scope and increases risk if you don't audit or run in a safe environment.
Install Mechanism
okNo install spec is provided; it's an instruction + code bundle that relies on standard Node tooling (package.json lists ethers). This is low-risk compared with download-and-extract installers. You still need to run npm install to fetch dependencies.
Credentials
concernThe runtime expects sensitive secrets (PRIVATE_KEY) and will read/write files under the user's home (~/.nadname). Yet the skill registry metadata did not declare any required env vars. Requesting access to a private key is reasonable for a registration tool, but the missing declaration is a transparency problem. Also the scripts may log or print mnemonic/private-key material to the console or write files; ensure you understand those flows before use.
Persistence & Privilege
noteThe skill writes/reads a managed keystore in ~/.nadname and wallet info files (normal for wallet tooling). It does not request always: true or system-wide changes, nor does it modify other skills. Persisted files live in the user home and are under your control, but their presence is permanent until you remove them.