OpenClaw Paid Actions

ReviewAudited by ClawScan on May 1, 2026.

Overview

The skill coherently describes a paid-action invoice flow, with disclosed reliance on a trusted plugin that can run configured scripts after Solana payment.

Install only if you trust the openclaw-paid-actions plugin and have reviewed every configured paid-action script. Protect the invoice secret and store path, verify the USDC recipient address, and require extra human approval for any action that posts publicly or changes important accounts.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A paid invoice could lead to real local script execution or public account activity, depending on the configured actions.

Why it was flagged

The skill intentionally allows a tool to execute configured local scripts after payment, including an example that can publish public content. This is purpose-aligned but high-impact if misconfigured.

Skill content
`execute`: Run the action after invoice is confirmed paid ... "command": ["node", "scripts/paid-actions/x-shoutout.mjs"] ... "Post a paid shoutout on X"
Recommendation

Only enable actions you have reviewed, keep commands tightly allowlisted, and require human approval for actions that post publicly or modify important accounts.

What this means

The real safety of the workflow depends on the installed plugin and action scripts, not just this instruction file.

Why it was flagged

The artifact does not include the plugin implementation or action scripts; the skill openly depends on separately installed trusted code.

Skill content
This skill is instruction-only. It expects a trusted installed implementation of the `openclaw-paid-actions` plugin that provides `openclaw_paid_action`.
Recommendation

Verify the plugin source and review every configured script before adding the tool to the agent's allowed tools.

What this means

A wrong payment address could misdirect funds, and a leaked invoice secret could undermine invoice integrity.

Why it was flagged

The skill requires a payment destination and invoice-signing secret, which are expected for this purpose but sensitive to misconfiguration or disclosure.

Skill content
"payTo": "${OPENCLAW_USDC_PAY_TO}", "invoiceSecret": "${OPENCLAW_PAID_ACTIONS_INVOICE_SECRET}", "invoiceStorePath": "${OPENCLAW_PAID_ACTIONS_INVOICE_STORE_PATH}"
Recommendation

Store the invoice secret securely, restrict access to the invoice store path, and verify the USDC recipient address before enabling production use.

What this means

Sensitive or unsafe action input could be retained in invoice records and later passed to an action script.

Why it was flagged

Action input can be persisted in signed invoice state and later reused for execution. This is expected, but users should avoid storing sensitive or unreviewed content in invoices.

Skill content
`invoice`: Create a signed invoice token for an action/input ... Invoice execution uses the input embedded in the invoice token.
Recommendation

Avoid putting secrets in paid-action inputs, set retention controls on invoice storage, and validate inputs inside each action script.