Paddle

v1.0.0

Integrate Paddle payments with subscriptions, webhooks, checkout, and tax compliance.

0· 425·1 current·1 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (Paddle payments, subscriptions, webhooks, checkout, tax) matches the provided docs and examples. However, the skill references sensitive runtime items (PADDLE_API_KEY, PADDLE_WEBHOOK_SECRET) and the Paddle CLI, yet the registry metadata lists no required environment variables or binaries — this mismatch is unexpected and should be clarified.
!
Instruction Scope
Runtime docs instruct the agent to read/write local memory in ~/paddle/, to save integration state, and contain guidance like 'observe their code, don't interrogate' which implicitly encourages the agent to inspect the user's codebase; the skill does not enumerate what filesystem paths are allowed. The docs also give examples that reference environment variables (PADDLE_API_KEY, PADDLE_WEBHOOK_SECRET) and recommend installing the Paddle CLI via npm, but the instructions do not explicitly constrain file or repo access — this broad scope could let the agent read unrelated files or accidentally store secrets in plain memory.
Install Mechanism
There is no install spec (instruction-only), which is lower risk, but the documentation recommends running npm install -g @paddle/paddle-cli for webhook testing. The lack of declared required binaries yet recommending a global npm install is an inconsistency the user should expect to resolve manually.
!
Credentials
Registry metadata declares no required environment variables, but api.md and webhooks.md clearly show use of PADDLE_API_KEY and PADDLE_WEBHOOK_SECRET. The architecture and memory references are inconsistent: some files imply API keys live in environment variables, other places show memory.md containing 'API keys, environment, product IDs'. This ambiguity is a security concern — secrets must be minimised, stored in env vars or secure vaults, and never written to a plaintext memory file.
Persistence & Privilege
The skill persists integration state under ~/paddle/ (memory.md and webhooks.md). Persisting local integration metadata is reasonable for this purpose, and always:false means it won't be force-included. Still, the guidelines should explicitly forbid storing secrets in that persisted memory file; currently the files contain mixed guidance about where keys live.
What to consider before installing
This skill's content appears to be a legitimate Paddle integration, but there are important inconsistencies you should resolve before installing or allowing an agent to use it autonomously: - Confirm environment variables: The docs use PADDLE_API_KEY and PADDLE_WEBHOOK_SECRET but the registry lists none. Require that the developer (or you) declare these env vars explicitly and keep keys in environment variables or a secure vault — do not store secrets in ~/paddle/memory.md. - Review local storage: The skill writes to ~/paddle/. Inspect that directory and the memory.md file format to ensure no plaintext secrets are saved. If you allow the agent to create files there, restrict their contents and file permissions. - Limit code access: The guidance to 'observe their code' could cause the agent to read unrelated source files. If you want the agent to inspect only specific repos or paths, enforce that constraint before use. - Verify webhook handling: Ensure webhook verification uses the webhook secret and timing-safe comparison as shown. Test only in sandbox until you confirm behavior. - Be cautious with CLI installs: The docs suggest installing the Paddle CLI (npm). Only run such installs from trusted sources and in controlled environments (sandbox/container) if you plan to follow that step. If you need higher assurance, ask the skill author to (1) list required env vars and binaries in the registry metadata, (2) explicitly state that memory.md will never contain secrets, and (3) narrow any instructions that read the user's codebase to specific, documented paths. If those clarifications are not available, treat the skill as suspicious and use it only in a constrained sandbox environment.

Like a lobster shell, security has layers — review code before you run it.

latestvk978gd0fxw9736vmd1r6cqgt7181s3ne

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🏓 Clawdis
OSLinux · macOS · Windows

Comments