Skill
Analysis
This appears to be a legitimate crypto wallet skill, but it gives an agent broad autonomous authority over private keys, on-chain transactions, purchases, trading, and DeFi actions.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Agents generate and manage their own keys — no human input required. Use when: ... sending tokens, calling contracts, ... bridging tokens cross-chain ... trading perpetual futures ... buying or selling Polymarket outcome shares
The skill exposes many irreversible or financially material blockchain actions and frames them for autonomous agent use, but the provided artifacts do not show approval, spending, market, or chain-scoping controls.
node | package: evalanche | creates binaries: evalanche-mcp
The skill relies on an external npm package and executable to implement wallet behavior. The reviewed artifact set contains only SKILL.md, so the high-impact code handling keys and transactions is not represented in the supplied files.
Storage location: `~/.evalanche/keys/` by default
The persistent keystore is disclosed and purpose-aligned, but it means the agent can retain wallet identity and signing capability across sessions.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
AGENT_PRIVATE_KEY (optional) - Hex-encoded private key (EVM) ... AGENT_MNEMONIC (optional) - BIP-39 mnemonic phrase
Private keys and mnemonics provide direct authority over wallet assets and identities. The artifacts disclose these secrets, but do not bound what funds, chains, or transaction types the agent may use once configured.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
HTTP mode (`--http`): localhost:3402. Do not expose publicly without auth.
The MCP HTTP mode is disclosed and limited to localhost by default, but exposing it without authentication could give other processes or users access to wallet tooling.
