Send real Document in the Mail via PostalForm
v1.0.0Send real postal mail through PostalForm using machine payments: prepare/validate print-and-mail payloads, submit `POST /api/machine/orders`, settle x402 pay...
⭐ 0· 338·0 current·0 all-time
byGabriel Garrett@ggaabe
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill claims to create PostalForm machine orders and settle x402 payments, and the SKILL.md contains a coherent workflow for that purpose. However, the manifest declares no required binaries, env vars, or primary credential even though the instructions explicitly expect a signing client (purl or other x402 client), keystore files (e.g. ~/.purl/keystores/...), and a wallet password. The implicit dependence on wallet tooling and secure inputs should have been declared.
Instruction Scope
Runtime instructions are narrowly scoped to building/validating payloads, calling PostalForm endpoints, creating/payments via an x402 wallet, and polling order status. They do reference local keystore paths and runtime password input and show curl/purl examples, but do not instruct reading unrelated system files or exfiltrating data to unexpected endpoints. The SKILL.md does not, however, declare these credential sources up front.
Install Mechanism
This is an instruction-only skill with no install spec or downloadable artifacts, so it does not write code to disk or fetch remote binaries during installation. That minimizes installation risk.
Credentials
The skill will require access to signing credentials (keystore files, wallet aliases, or raw private keys) and a password or signing ability to settle payments — sensitive privileges. The manifest lists no required env vars or primary credential, so callers may not realize they must supply wallet access. Requiring private signing abilities is proportionate to a paid mail flow, but the omission of explicit credential declarations and the potential for mishandling private keys (examples show keystore paths and PURL_PASSWORD usage) is a material risk.
Persistence & Privilege
The skill does not request always:true, does not include an install that modifies other skills, and is user-invocable only. It does assume the agent can call network endpoints and use local wallet tooling, which is normal for this kind of task.
What to consider before installing
This skill appears to be doing what it says (create PostalForm orders and pay them), but pay attention to these points before installing or granting runtime access:
- Expect to provide wallet signing capabilities: the instructions assume you have a signing client (purl or another x402 client), access to keystore files (or raw private keys), and a password or interactive signing approval. The skill metadata does not declare these requirements — confirm how your agent runtime will supply them.
- Never hand over raw private keys to an agent or put them in plaintext env vars. Prefer encrypted keystores, ephemeral wallets, or wallets that require a hardware or interactive approval if possible.
- Limit blast radius: use a wallet with a small balance and set a conservative --max-amount cap as recommended in the examples. Test with small, low-cost orders first (validate endpoint and small payments).
- Verify the endpoint: the skill directs traffic to https://postalform.com — confirm this is the legitimate service you expect and that you trust it to handle payments and address data.
- Ensure explicit human approval for any on-chain/payment signing actions. The skill can be invoked autonomously by agents; require an explicit consent/approval step for payments.
- Logging: follow the skill's own security rules (do not log passwords or private keys). Make sure your runtime enforces these logging rules.
If you want to accept this skill, ask the publisher to update the manifest to declare required binaries (e.g., purl), required env vars or config paths (keystore locations or a primary wallet credential), and to document expected interactive approval patterns. If you cannot provide a dedicated, limited wallet for testing, treat this skill as risky.Like a lobster shell, security has layers — review code before you run it.
latestvk970q0j8x7jqwdw63cn2dtqs2h81s537
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
