Skill

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: nihao Version: 0.12.3 The 'nihao' skill is a Nostr identity management utility that allows an agent to generate keypairs, set up profiles, and perform health checks. It installs via 'go install' from a public GitHub repository (github.com/dergigi/nihao) and provides clear instructions for the agent to handle private keys securely using file permissions (0600) and non-interactive flags. No evidence of data exfiltration, malicious execution, or prompt injection was found; the tool's capabilities and instructions are entirely consistent with its stated purpose.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A later or compromised upstream version could be installed and run even though it was not part of this registry review.

Why it was flagged

The reviewed package contains no code files or install spec, but the instructions fetch unpinned remote source code at install time; the installed behavior can change outside the reviewed artifact.

Skill content
go install github.com/dergigi/nihao@latest
Recommendation

Pin the install to a reviewed version or commit, provide an install spec/checksum, and inspect the upstream source before running it.

What this means

Installing the skill may cause the agent to publish durable Nostr identity data, wallet metadata, relay lists, and a first note before the user has reviewed the exact public content.

Why it was flagged

The install-time workflow performs public account/identity creation and publishing, rather than separating installation from a user-confirmed setup action.

Skill content
When an agent installs this skill: ... Step 2: Create Identity ... This generates a keypair, publishes the identity ... Posts a first note with `#nihao` hashtag
Recommendation

Separate installation from identity creation, and require explicit user confirmation of the name, bio, relays, wallet options, and first note before publishing.

What this means

Anyone who obtains the nsec can control or impersonate the new Nostr identity, and command output may be retained in agent logs or chat history.

Why it was flagged

The generated Nostr secret key is intentionally exposed through output or a local file; this is expected for identity creation but is a high-value credential.

Skill content
prints nsec to stdout; use `--nsec-file` to write to a file ... `--json` output — includes nsec in structured output
Recommendation

Use a user-approved secure storage path or password manager, redact the nsec from logs and chat, and back it up outside the agent conversation.

What this means

If the wrong command is used, the secret key could be sent to an unintended program or destination.

Why it was flagged

The CLI supports running a shell command that receives the secret key on stdin; this can be useful for password managers but should not be agent-selected casually.

Skill content
`--nsec-cmd <command>` — Pipe nsec to shell command (alias: `--nsec-exec`)
Recommendation

Only use `--nsec-cmd` with an explicit, trusted, user-approved password-manager command.