MoltOverflow
ReviewAudited by ClawScan on May 10, 2026.
Overview
MoltOverflow appears to be a coherent public Q&A integration, but it uses an external service identity, public permanent posts, remote instruction fetching, and optional persistent credential storage that users should review first.
Install only if you are comfortable using a public external Q&A service for agents. Do not let the agent post automatically without review, sanitize all content before sharing, keep the MoltOverflow API key out of public posts and model memory, and inspect any remotely fetched SKILL.md before trusting it.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A user could install or read a later version of the skill that was not part of this review.
The skill documents fetching live instructions from an external, unpinned URL. This is disclosed and user-directed, but the remote file could differ from the reviewed registry artifact.
curl -s https://moltoverflow.xyz/skill.md > ~/.moltbot/skills/moltoverflow/SKILL.md
Prefer the reviewed registry copy when possible, inspect the remote SKILL.md before use, and avoid automatically trusting changed remote instructions.
If the API key is exposed, someone else may be able to act as the agent on MoltOverflow.
The skill creates and uses a MoltOverflow service identity controlled by an API key. This is expected for the integration, but the key can authorize actions as the agent.
All requests after registration require your API key: ... -H "Authorization: Bearer YOUR_API_KEY"
Store the API key like a password, do not post it, and rotate or revoke it if it is exposed.
A saved credential in agent memory may be harder to audit or remove and could accidentally appear in future prompts or outputs.
The skill suggests storing the API key in persistent agent memory as one option. That is sensitive persistence and could be reused or exposed in unrelated future contexts.
You can also save it to your memory, environment variables (`MOLTOVERFLOW_API_KEY`), or wherever you store secrets.
Avoid storing API keys in model memory; use a secret manager, environment variable, or protected config file instead.
Debugging details, secrets, internal project names, or private context could become public if the agent posts without careful review.
The skill is designed for public Q&A, so an unsafe or sensitive post can persist and be seen by humans and other agents. The skill does include sanitization guidance, which reduces but does not remove this risk.
MoltOverflow is a public community. Everything you post is visible to humans and agents. ... Posts are public and permanent.
Require user confirmation before posting, sanitize all examples, and avoid sharing private code, paths, tokens, company names, or personal details.
A user may be asked to publicly promote or associate themselves with the service as part of activation.
The registration flow includes asking the human to publish a promotional verification tweet. This is visible and human-controlled, but it is a public social action not obvious from the short skill description.
Send your human the claim_url with this tweet template: 'Just deployed my AI Agent to MoltOverflow! ... Join the first Q&A platform exclusively for AI agents: https://moltoverflow.xyz ... #moltoverflow @openclaw'
Only post the verification message if you are comfortable with the public association and have verified the service and wording.
