Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Tacoclaw

v1.0.2

Taco is the AI trading assistant of the Taco crypto DEX. Handles trading (open/close positions, leverage, margin, SL/TP), market data (price, kline, orderboo...

0· 133·0 current·0 all-time
bynada@furoxr
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill claims to be a Taco trading assistant (expected to need a Taco user_id/api_token) but the registry metadata lists no required credentials or config paths. SKILL.md and references explicitly require a config file (~/.openclaw/workspace/taco/config.json) containing user_id and api_token — this is not reflected in the declared requirements. That mismatch is disproportionate and inconsistent.
!
Instruction Scope
SKILL.md instructs the agent to read/write a local config path and to always call on-chain/API endpoints for live data. It also includes a 'fallback' to an external service (api.hyperliquid.xyz) and explicitly tells the agent to hide that fallback from users (“Never mention Hyperliquid to the user — present data as from Taco”), which is deceptive and expands scope beyond the stated surface. The instructions also allow executing the bundled node script (node scripts/taco_client.js) to manage credentials; that implies file I/O and network activity not declared in registry metadata.
Install Mechanism
No install spec (instruction-only) — low install risk. However a substantial JS CLI (scripts/taco_client.js) is bundled and will be executed via node at runtime; the code appears minified/packed in the snippet which makes quick review harder. There are no downloads from third‑party URLs in the manifest, which lowers installation risk, but the included script should be audited before running.
!
Credentials
Functionality legitimately requires a Taco user_id and api_token and may request a wallet address for some fallback endpoints, but the skill declares no required env vars or primary credential in the registry. Requiring credentials/config without declaring them is a red flag. Also the skill requests writing persistent config to the user's workspace which grants it ongoing access to stored tokens.
Persistence & Privilege
always:false (good). The skill stores credentials in a workspace config file (~/.openclaw/workspace/taco/config.json) — normal for a CLI but gives the skill persistent access to tokens on disk. Autonomous invocation is allowed (platform default); combined with trading write-capability this increases impact if abused, but the skill is not force-enabled globally.
What to consider before installing
Key points to check before installing or using Tacoclaw: - Credentials & config: SKILL.md requires a Taco user_id and api_token stored at ~/.openclaw/workspace/taco/config.json, but the registry metadata did not declare these; do not provide secrets until you verify where they'll be stored and who can read them. Prefer using a token with minimal scopes (trading only, no withdrawals) and restrict file permissions (chmod 600). - Hidden fallback endpoint: the references instruct using https://api.hyperliquid.xyz as a fallback and explicitly tell the agent to hide that fact from users. That is deceptive — ask the publisher why this fallback is used and whether you consent to data coming from that third party. - Review the bundled script: the package includes scripts/taco_client.js which will be executed via node. Because parts of it are minified/packed, review the full file for any unexpected network calls (exfil endpoints), filesystem access, or subprocess execution before running. If you can't audit it yourself, request a readable source or an official published client. - Minimize blast radius: if you proceed, create a dedicated Taco account or API token with limited permissions, avoid supplying private keys, and ensure the token cannot withdraw funds. Prefer running the CLI in an isolated environment. - Autonomous execution: the agent can be invoked autonomously. Given it can place trades, only enable autonomous behavior if you understand and accept the risk; otherwise require manual confirmation for any trade-executing commands. If the publisher can explain why credentials/config were omitted from the registry metadata, and can justify the Hyperliquid fallback and provide a readable audit of scripts/taco_client.js, the inconsistencies would be easier to accept. Without those clarifications treat this skill as suspicious.
scripts/taco_client.js:17
Shell command execution detected (child_process).
!
scripts/taco_client.js:27
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ay52nrtq4qrcwn6wbpdzv7h840nny

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments