Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Typhoon Starknet Account

v0.3.8

Create an anonymous Starknet wallet via Typhoon and interact with Starknet contracts. Privacy-focused wallet creation for agents requiring anonymity.

1· 2.3k·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The name/description align with the code: it uses Typhoon SDK to create anonymous Starknet accounts and uses starknet/AVNU SDKs for reads/writes. Declared prerequisites in SKILL.md (npm packages, optional STARKNET_RPC_URL) match package.json and code. Small mismatch: registry metadata lists no required env vars, but the scripts expect/process STARKNET_RPC_URL, PAYMASTER_URL (via env), and allow STARKNET_SECRETS_DIR override — these environment touches are reasonable for a wallet tool but were not listed as required in the registry metadata.
!
Instruction Scope
Runtime instructions and scripts do more than simple wallet creation/calls: they write private key files under ~/.openclaw/secrets/starknet, create/modify cron jobs (editing crontab), run child_process exec to manage crontab, and can POST event data to arbitrary webhook URLs. These behaviors go beyond a minimal 'create-wallet and call contracts' scope and allow persistent background activity and remote data transmission.
Install Mechanism
There is no formal install spec in the registry, but SKILL.md instructs running npm install and package.json lists multiple external dependencies (starknet, typhoon-sdk, @avnu/avnu-sdk, etc.). That means running network installs is required to use the scripts; the install will pull third-party packages (expected for this functionality) but is not automated or reviewed by the registry spec.
!
Credentials
The skill reads and writes local secret material (private keys and artifacts in ~/.openclaw/secrets/starknet) which is expected for a wallet, but it also reads optional environment variables (STARKNET_RPC_URL, PAYMASTER_URL, STARKNET_SECRETS_DIR) and can send events to external webhook URLs provided in watcher inputs. The skill does not require explicit registry-declared credentials, yet it handles highly sensitive secrets on disk and uses network endpoints — this requires careful trust and explicit user consent.
!
Persistence & Privilege
Although always:false, the skill's watcher can create cron jobs (writes scripts under ~/.openclaw/cron and modifies the user's crontab) to run persistently. It also writes long-lived artifacts and key files into the user's home. These are significant persistence and privilege actions that should be disclosed and approved by the user before use.
What to consider before installing
This skill appears to implement the advertised anonymous wallet + contract flows, but it performs several sensitive actions you should consider before installing: - Private keys are generated and stored on disk under ~/.openclaw/secrets/starknet. If you install/use this skill, your agent (and anyone with access to that path) can access those keys. Use a dedicated machine or isolated account and back up keys securely. - The event watcher can create cron jobs and modify your crontab (~/.openclaw/cron and system crontab). That gives the skill persistent, scheduled execution outside the agent. Only allow this if you trust the code and want continuous monitoring. - The watcher can POST events to user-specified webhook URLs. Verify any webhook targets and avoid exposing private data to unknown endpoints. - There is no automated install spec in the registry; you must run 'npm install' to fetch dependencies. Inspect package.json and the listed dependencies before installing, and consider installing in an isolated environment (container/VM) to limit blast radius. - The skill references environment variables (STARKNET_RPC_URL, PAYMASTER_URL, STARKNET_SECRETS_DIR) that are not declared as required in registry metadata — set them explicitly and review defaults (e.g., default RPC and paymaster hosts). Recommendations: - Review the create-account.js and watcher scripts locally to confirm behavior and tweak paths/cron behavior if necessary. - If you only need on-demand operations, avoid enabling the watcher/cron functionality. - Use an account with minimal funds for testing, and consider keeping secrets in a controlled secure store rather than defaulting to the home directory. Given the combination of local secret handling, crontab modification, and remote webhook capabilities, treat this skill as 'suspicious' unless you can fully audit and control how it is run.

Like a lobster shell, security has layers — review code before you run it.

latestvk9767mpvx23m8t201rv34e2hqs82101y

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments