Connectors Available

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches its stated Hummingbot connector-checking purpose, but its helper scripts handle local config and user-supplied arguments in ways that could run unintended code or overwrite files.

Install only if you trust the scripts and your local Hummingbot setup. Before use, avoid running it from directories with untrusted .env files, do not let untrusted prompts choose --token, --data, or --output values, prefer simple alphanumeric token symbols, and use dedicated local Hummingbot API credentials rather than broad account credentials.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

A maliciously crafted token or data-file argument could make the helper execute commands on the user's machine instead of only searching trading rules.

Why it was flagged

The heredoc is expanded by bash and command-line values are inserted directly into Python source. A crafted --token or --data value containing quotes and Python statements could alter the generated Python program and run local code.

Skill content
python3 << PYTHON
...
token = "${TOKEN}".upper()
data_file = "${DATA_FILE}"
Recommendation

Pass arguments to Python via argv or environment variables, use a quoted heredoc, and validate token names and file paths before execution.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

If a local .env file is malicious or compromised, using this skill can run arbitrary shell commands under the user's account.

Why it was flagged

The script sources the first matching .env file, which executes it as shell code. This is more dangerous than parsing key/value environment settings.

Skill content
for f in hummingbot-api/.env ~/.hummingbot/.env .env; do
    if [ -f "$f" ]; then
        set -a; source "$f"; set +a
Recommendation

Parse only expected key/value names from configuration files instead of using source, and run the skill only from trusted directories with trusted .env files.

What this means

If the agent is instructed to use a sensitive output path, the script could clobber a file the user can write.

Why it was flagged

The helper accepts a user-controlled output path and overwrites/appends to it without restricting the path to the skill's data directory or confirming overwrite.

Skill content
--output) OUTPUT_FILE="$2"; shift 2 ;;
...
echo "{" > "$OUTPUT_FILE"
...
echo "\"$connector\": $result" >> "$OUTPUT_FILE"
Recommendation

Restrict output to the skill's data directory, reject absolute paths and parent-directory traversal, and ask for confirmation before overwriting existing files.

What this means

The skill will use Hummingbot API credentials for the configured API URL; those credentials may allow more access than just reading trading rules.

Why it was flagged

The script authenticates to the configured Hummingbot API using environment/default credentials, while the registry metadata declares no required credentials or environment variables.

Skill content
API_USER="${API_USER:-admin}"
API_PASS="${API_PASS:-admin}"
AUTH="-u $API_USER:$API_PASS"
CONNECTORS=$(curl -s $AUTH "$API_URL/connectors/"
Recommendation

Use dedicated least-privilege Hummingbot API credentials if possible, keep the API URL local/trusted, and declare the credential/environment requirements in metadata.

What this means

Users have less information to verify the publisher and may not realize which local tools and settings the skill needs.

Why it was flagged

The registry gives no source/homepage provenance and under-declares runtime requirements compared with the scripts' use of curl, python3, and Hummingbot API settings.

Skill content
Source: unknown
Homepage: none
...
Required binaries (all must exist): none
Required env vars: none
Recommendation

Publish a verifiable source or homepage and declare required binaries, environment variables, and credential expectations.