Skill
ReviewAudited by ClawScan on May 10, 2026.
Overview
The skill is not clearly malicious, but it asks an agent to fetch unpinned GitHub code and create/publish a Nostr identity during installation, so it needs careful review.
Install only if you want an agent-created public Nostr identity. Review or pin the GitHub source before running, do not let setup run automatically without confirming the public profile and wallet settings, and keep the generated nsec out of chat logs and source-controlled folders.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A later or compromised upstream version could be installed and run even though it was not part of this registry review.
The reviewed package contains no code files or install spec, but the instructions fetch unpinned remote source code at install time; the installed behavior can change outside the reviewed artifact.
go install github.com/dergigi/nihao@latest
Pin the install to a reviewed version or commit, provide an install spec/checksum, and inspect the upstream source before running it.
Installing the skill may cause the agent to publish durable Nostr identity data, wallet metadata, relay lists, and a first note before the user has reviewed the exact public content.
The install-time workflow performs public account/identity creation and publishing, rather than separating installation from a user-confirmed setup action.
When an agent installs this skill: ... Step 2: Create Identity ... This generates a keypair, publishes the identity ... Posts a first note with `#nihao` hashtag
Separate installation from identity creation, and require explicit user confirmation of the name, bio, relays, wallet options, and first note before publishing.
Anyone who obtains the nsec can control or impersonate the new Nostr identity, and command output may be retained in agent logs or chat history.
The generated Nostr secret key is intentionally exposed through output or a local file; this is expected for identity creation but is a high-value credential.
prints nsec to stdout; use `--nsec-file` to write to a file ... `--json` output — includes nsec in structured output
Use a user-approved secure storage path or password manager, redact the nsec from logs and chat, and back it up outside the agent conversation.
If the wrong command is used, the secret key could be sent to an unintended program or destination.
The CLI supports running a shell command that receives the secret key on stdin; this can be useful for password managers but should not be agent-selected casually.
`--nsec-cmd <command>` — Pipe nsec to shell command (alias: `--nsec-exec`)
Only use `--nsec-cmd` with an explicit, trusted, user-approved password-manager command.
