Deploy Contracts

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill is purpose-aligned, but it can use your Aptos CLI account to deploy contracts with no-confirm commands and an ambiguous default profile, including for workflows that mention mainnet.

Review carefully before installing or invoking. Only use this skill with an explicitly chosen Aptos profile, verify the target network and signer address, avoid `--assume-yes` for real deployments, and require manual approval before any transaction that publishes or upgrades contracts—especially on mainnet.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI02: Tool Misuse and Exploitation
High
What this means

A user or agent following the workflow could deploy or publish using the configured Aptos profile without the CLI's normal confirmation prompt.

Why it was flagged

The skill's default deployment command publishes contract code using the Aptos CLI while suppressing interactive confirmation. For a skill that also describes mainnet deployment, this is high-impact unless the agent first gets explicit user confirmation of the package, address, account, network, and cost.

Skill content
aptos move deploy-object \
    --address-name my_addr \
    --profile default \
    --assume-yes
Recommendation

Do not use `--assume-yes` as the default for deployment, especially for mainnet. Require an explicit human approval step showing the target network, profile, signer address, package hash/name, and expected fees before running any publish/deploy command.

#
ASI03: Identity and Privilege Abuse
High
What this means

The skill could cause actions to be signed by the wrong Aptos account or sent to the wrong network if the user's default profile is not what the workflow assumes.

Why it was flagged

The workflow relies on local Aptos CLI profiles and the `default` profile, which represent signing authority for an account. The registry metadata declares no primary credential or required config path, and the visible instructions do not require verifying that `default` points to the intended account and network before deployment.

Skill content
aptos config show-profiles

# If no profile exists, initialize one
aptos init --network testnet --assume-yes
...
aptos account balance --profile default
Recommendation

Declare the Aptos CLI profile/config requirement, avoid relying on `default`, and require the user to select and confirm the exact profile, network, account address, and balance before any transaction-signing command.

#
ASI04: Agentic Supply Chain Vulnerabilities
Low
What this means

Some safety guidance depends on files or skills outside the reviewed artifact set.

Why it was flagged

The skill references another skill and a relative SECURITY.md file that are not included in the provided one-file manifest. This is not malicious by itself, but users cannot verify those referenced checks from the supplied artifact alone.

Skill content
Security audit completed (use `security-audit` skill) ... See [SECURITY.md](../../../patterns/move/SECURITY.md)
Recommendation

Verify that the referenced security-audit skill and SECURITY.md guidance are available and trusted before relying on this deployment checklist.