Dark Web Credential Checker

MaliciousAudited by ClawScan on May 10, 2026.

Overview

This paid breach-checker is advertised as querying real breach and dark-web sources, but the included code generates simulated breach results instead.

Do not rely on or pay for this skill as a real breach checker based on the provided artifacts. If you test it at all, use dummy emails, avoid the Discord command path for private identifiers, and prefer established breach-checking services with clear API behavior and privacy terms.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Users may receive fabricated breach or clean results, make poor security decisions, or pay for a tool that does not perform the advertised checks.

Why it was flagged

The code explicitly uses simulated, deterministic breach results, while SKILL.md advertises real searches of public breach databases, paste sites, HIBP, DeHashed, and LeakCheck.

Skill content
# Breach data (simulated public breach database)
# In production, this would query HIBP API, DeHashed, etc.
...
email_hash = hashlib.md5(email.lower().encode()).hexdigest()
num_breaches = email_num % 5
Recommendation

Do not rely on this skill for real breach checking unless it is clearly labeled as a demo or updated to use documented, verifiable breach-data APIs.

What this means

The skill can produce invalid password-breach conclusions and may send a derived hash prefix of the searched email to an external service.

Why it was flagged

The optional HIBP-style path hashes an email address and queries the Pwned Passwords range API, which is meant for password hashes, not email breach lookups.

Skill content
sha1 = hashlib.sha1(email.lower().encode()).hexdigest().upper()
url = f"https://api.pwnedpasswords.com/range/{prefix}"
Recommendation

Use the correct HIBP breached-account API or clearly document any k-anonymity/password-check workflow and what data leaves the machine.

What this means

A user's email address, username, and breach-check intent could be exposed to a third-party platform or other channel participants.

Why it was flagged

The instructions encourage submitting sensitive email lookup targets in a Discord support channel without explaining who can see, store, or process those queries.

Skill content
As OpenClaw Discord Command

In `#edgeiq-support` channel:
```
!breach user@example.com
!breach user@example.com --pro
```
Recommendation

Avoid posting real emails or usernames in public/shared Discord channels; the publisher should provide private input paths and a clear privacy statement.

What this means

Local license identifiers may be used by the tool, although no outbound transmission is shown in the provided code.

Why it was flagged

The code reads a local license file and license/email environment variables, while the registry metadata declares no required env vars or primary credential.

Skill content
LICENSE_FILE = Path.home() / ".edgeiq" / "license.key"
env_key = os.environ.get("EDGEIQ_LICENSE_KEY", "").strip()
email = os.environ.get("EDGEIQ_EMAIL", "").strip().lower()
Recommendation

Document all license files and environment variables in metadata and in the skill instructions.

What this means

Users could install code that differs from the reviewed artifact if the external repository changes.

Why it was flagged

The README points users to an unpinned external repository, while the registry source is unknown and there is no install spec.

Skill content
git clone https://github.com/snipercat69/edgeiq-credential-checker.git
cd edgeiq-credential-checker
Recommendation

Install only reviewed package contents or a pinned commit from a trusted source.