Skill

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is not clearly malicious, but it asks an agent to fetch unpinned GitHub code and create/publish a Nostr identity during installation, so it needs careful review.

Install only if you want an agent-created public Nostr identity. Review or pin the GitHub source before running, do not let setup run automatically without confirming the public profile and wallet settings, and keep the generated nsec out of chat logs and source-controlled folders.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A later or compromised upstream version could be installed and run even though it was not part of this registry review.

Why it was flagged

The reviewed package contains no code files or install spec, but the instructions fetch unpinned remote source code at install time; the installed behavior can change outside the reviewed artifact.

Skill content
go install github.com/dergigi/nihao@latest
Recommendation

Pin the install to a reviewed version or commit, provide an install spec/checksum, and inspect the upstream source before running it.

What this means

Installing the skill may cause the agent to publish durable Nostr identity data, wallet metadata, relay lists, and a first note before the user has reviewed the exact public content.

Why it was flagged

The install-time workflow performs public account/identity creation and publishing, rather than separating installation from a user-confirmed setup action.

Skill content
When an agent installs this skill: ... Step 2: Create Identity ... This generates a keypair, publishes the identity ... Posts a first note with `#nihao` hashtag
Recommendation

Separate installation from identity creation, and require explicit user confirmation of the name, bio, relays, wallet options, and first note before publishing.

What this means

Anyone who obtains the nsec can control or impersonate the new Nostr identity, and command output may be retained in agent logs or chat history.

Why it was flagged

The generated Nostr secret key is intentionally exposed through output or a local file; this is expected for identity creation but is a high-value credential.

Skill content
prints nsec to stdout; use `--nsec-file` to write to a file ... `--json` output — includes nsec in structured output
Recommendation

Use a user-approved secure storage path or password manager, redact the nsec from logs and chat, and back it up outside the agent conversation.

What this means

If the wrong command is used, the secret key could be sent to an unintended program or destination.

Why it was flagged

The CLI supports running a shell command that receives the secret key on stdin; this can be useful for password managers but should not be agent-selected casually.

Skill content
`--nsec-cmd <command>` — Pipe nsec to shell command (alias: `--nsec-exec`)
Recommendation

Only use `--nsec-cmd` with an explicit, trusted, user-approved password-manager command.