Safe Skills

v1.0.0

Securely create and manage EVM wallets; perform token transfers, check balances, and send transactions without exposing raw secret keys.

1· 1.7k·0 current·0 all-time
byChris Cassano@glitch003
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
SKILL.md describes a secret-management/EVM-wallet service that requires a Bearer API key for all requests and references SAFESKILLS_API_URL/SAFESKILLS_FRONTEND_URL, but the skill metadata declares no required environment variables or primary credential. A secrets/wallet skill would reasonably need to declare those credentials and a primaryEnv; the absence is an inconsistency.
!
Instruction Scope
Runtime instructions show the agent calling an external API to create wallets, store an API key, check balances, transfer tokens, and send arbitrary transactions (including raw calldata). The instructions reference an env var (SAFESKILLS_API_URL) not declared in metadata and tell the agent to "store the returned API key" without specifying secure storage. The agent could be directed to perform financial operations or persist credentials without clear safeguards or user confirmation.
Install Mechanism
No install spec and no code files: instruction-only skill. This minimizes on-disk risk since nothing is downloaded or executed locally as part of installation.
!
Credentials
Although the workflow clearly requires an API key for the external service and optionally the SAFESKILLS_API_URL env var, the skill metadata lists no required env vars or primary credential. That mismatch (required secrets present in practice but not declared) is disproportionate and reduces transparency about what secrets/permissions the skill will use.
!
Persistence & Privilege
always:false and autonomous invocation are default, but the skill's capabilities let an agent (if allowed) initiate token transfers and arbitrary transactions using the external API key. Combined with the instruction to "store the API key" this increases risk—agents should require explicit, auditable user confirmation before any financial action and guidance on where/how API keys are stored.
What to consider before installing
Key things to consider before installing or enabling this skill: - Verify the external service: the default API URL points to a Railway-hosted app (safeskill-production.up.railway.app). Confirm you trust the operator/owner before giving it any access to wallets or funds. - Metadata mismatch: the SKILL.md expects an API key and optionally SAFESKILLS_API_URL, but the registry declares no required env vars or primary credential. Ask the publisher to update metadata to explicitly list required env vars and the primary credential. - High-impact actions: the skill can create wallets and perform transfers or arbitrary contract calls. If you allow model invocation, require the agent to obtain explicit user confirmation for any transfer or transaction, or disable autonomous invocation. - Secret handling: the instructions say to "store the API key" but give no secure-storage guidance. Ensure the agent does not persist raw API keys in plaintext or expose them in logs. Prefer a vetted secret store and least-privilege policies. - Test safely: if you want to evaluate the skill, test using a testnet chain (Sepolia is the default chainId shown) and small amounts first. - If you cannot validate the service owner or the metadata fixes, treat this skill as untrusted and do not allow it to hold real funds or run autonomously. My assessment is "suspicious" (medium confidence) because the instructions and actions make sense for a secret/wallet service, but the missing declared credentials and lack of operational safeguards (where/how the API key is stored, user-confirmation for transfers, unverified external endpoint) are notable red flags. Additional information that would raise confidence to "high": explicit metadata listing required env vars/primary credential, published owner/contact information, and documented safe storage/confirmation behavior for transactions.

Like a lobster shell, security has layers — review code before you run it.

latestvk975majrr5m5jv6wkg2p04vmex809req

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments