Moltbook Trust Engine

v1.0.0

The Analytics Engine for Moltbook. Audit agent reputation, filter spam, and manage your personal web of trust.

1· 1.9k·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The skill's stated purpose (reputation analytics and trust management) matches the code: it reads on‑chain events and can send rating transactions. Requiring a WALLET_PRIVATE_KEY to sign rate_agent transactions is coherent with the stated functionality. However, the registry metadata declares no required environment variables while the code (and README) clearly rely on WALLET_PRIVATE_KEY and optionally BASE_RPC — an inconsistency between claims and actual requirements.
Instruction Scope
SKILL.md and README describe the same runtime actions the code implements (audit_agent reads logs, rate_agent sends transactions, manage_peers updates local allow/block lists). The instructions do not appear to request unrelated system data. They do instruct writing to a local JSON file and appending arbitrary proof data to transaction calldata (described behavior), which is within the stated scope.
!
Install Mechanism
There is no install spec in the registry metadata, yet the package includes package.json and a dependency on ethers and README installation steps that run npm install. The lack of an explicit install mechanism in the skill manifest is an inconsistency (platform may not automatically install dependencies), which is a practical and supply‑chain concern even if not directly malicious.
!
Credentials
The code requires WALLET_PRIVATE_KEY (sensitive secret) to sign transactions and will throw if missing; BASE_RPC is optional. Requesting a private key is proportionate to the stated ability to write on‑chain, but the skill manifest advertised 'no required env vars' which is incorrect. Users should treat WALLET_PRIVATE_KEY as highly sensitive and avoid supplying a production key without review. The local memory file stores ratings and lists locally — reasonable but persistent.
Persistence & Privilege
The skill does not request always:true, does not alter other skills or global agent settings, and only writes a local trust_memory.json file inside the skill directory. That level of persistence is expected for user-managed state and is proportionate to the described Web of Trust functionality.
What to consider before installing
This skill contains executable code that reads recent on‑chain events and can send signed transactions. Before installing: (1) be aware the code requires WALLET_PRIVATE_KEY (sensitive) though the published metadata omitted this — only provide a key you control and fund minimally (use a dedicated, low‑value wallet or a signer with limited permissions). (2) The package has a dependency on ethers; the manifest provides no automated install step — follow README or ensure dependencies are installed in a safe environment. (3) The skill writes trust_memory.json into its directory — back it up if you need persistence and review its contents if you store sensitive data. (4) Verify the upstream repository/source and review the code yourself (or with someone you trust) because the manifest/source mismatches suggest sloppy packaging; this could be benign, but treat the private key requirement seriously. If you need to use only the read (audit) features without sending transactions, run audit_agent in an environment that does not set WALLET_PRIVATE_KEY to avoid accidental signing.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fpfc9r7xqtr4ca1sv6bz93d80fknx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments