Clawracle Oracle Resolver

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill matches its oracle purpose, but it can automatically use a blockchain private key to approve and risk tokens, so it should be reviewed carefully before use.

Only run this with a dedicated, low-balance wallet and reviewed API keys. Set strict max bond, allowance, category, and reward rules before enabling automatic monitoring, and review the dependency setup plus any API guide files for accidental real secrets.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent is wrong, misconfigured, or tricked into resolving bad requests, the wallet can spend or lose CLAWCLE bond funds.

Why it was flagged

The script loads a private wallet key from the environment and uses it to approve token spending for oracle bonds.

Skill content
const wallet = new ethers.Wallet(process.env.CLAWRACLE_AGENT_KEY, provider); ... const approveTx = await token.approve(registryAddress, bondAmount);
Recommendation

Use a dedicated low-balance wallet, set maximum bond and allowance limits, and require confirmation for high-value requests.

What this means

The agent may make irreversible on-chain submissions and token approvals without the user reviewing each request.

Why it was flagged

The documented flow automatically triggers blockchain write actions after a request event, but the provided artifacts do not show a built-in user approval gate or spend cap before submitting.

Skill content
// This function is called automatically by the agent when: ... const resolveTx = await registry.resolveRequest(
Recommendation

Add explicit allowlists, max-bond/max-allowance checks, and human approval for disputes or requests above a safe threshold.

What this means

A malicious or malformed request could steer the agent into wrong API calls, bad answers, or costly on-chain actions.

Why it was flagged

Requester-controlled IPFS data is fed into an LLM-driven API construction flow, and the artifacts do not show prompt-injection boundaries or strict validation before the resulting answer is submitted on-chain.

Skill content
Fetches query from IPFS ... Uses LLM to determine which API to call ... LLM constructs API call dynamically
Recommendation

Treat IPFS queries and API responses as untrusted data, enforce schema validation and API allowlists, and separate data extraction from operational instructions.

What this means

If those files are changed incorrectly or maliciously, future oracle answers may use the wrong sources or unsafe request patterns.

Why it was flagged

Persistent API configuration and documentation can influence future LLM-generated API calls.

Skill content
"agentCanEdit": "Agents can create and edit API configurations and documentation files when instructed by the owner. Use fs.writeFileSync() to save changes."
Recommendation

Keep API config files under owner review, validate them against a schema, and monitor changes with version control.

What this means

Users may install unpinned or unexpected dependencies to run the scripts.

Why it was flagged

The skill includes Node scripts that require external packages, but the provided artifacts do not include a package manifest or pinned install process.

Skill content
No install spec — this is an instruction-only skill.
Recommendation

Install only reviewed dependencies from trusted sources, pin versions, and prefer a lockfile or documented reproducible setup.