Whop

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a coherent Whop business-operations guide with no code, but it can guide use of Whop API credentials and persistent local business notes, so users should keep scopes and saved data under control.

This skill appears safe to install if you want Whop-specific business and API guidance. Before using advanced features, make sure any Whop API key is scoped appropriately, keep sandbox and production separate, verify webhooks, and review the ~/whop/ memory files so they do not contain secrets or stale business identifiers.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If a broad Whop credential is supplied, API calls may read or affect company resources such as products, payments, stats, webhooks, and embedded access flows.

Why it was flagged

The skill may use real Whop account or company credentials for advanced API work. This is expected for the integration, but those credentials can carry meaningful business permissions.

Skill content
Official API accepts a company API key, company scoped JWT, app API key, or user OAuth token as bearer auth
Recommendation

Use environment variables, sandbox credentials for testing, and the narrowest Whop credential or permission set that satisfies the task.

What this means

Mistaken API use could inspect the wrong company, mix sandbox and production, or change business configuration if the user asks for mutations.

Why it was flagged

The advanced workflow guidance covers API surfaces that can expose or change important business data. The artifacts present them as user-directed advanced workflows rather than automatic actions.

Skill content
The published Whop OpenAPI exposes these high-signal families: ... Payments ... Promo codes ... Webhooks ... Files ... Access tokens ... Stats
Recommendation

Confirm company IDs, sandbox versus production, and intended read/write impact before allowing API actions, especially around payments, promo codes, webhooks, files, and access tokens.

What this means

Local memory could reveal business context or cause the agent to reuse stale company, environment, or webhook information in future Whop tasks.

Why it was flagged

The skill intentionally persists local Whop context for future use. That is aligned with its business-operations purpose, but saved IDs, webhook details, and operating notes may influence later actions.

Skill content
What You're Saving (internally) ... Company, product, plan, user, affiliate, webhook, and checkout identifiers
Recommendation

Review ~/whop/ periodically, avoid storing secrets, label sandbox versus production clearly, and remove stale IDs or activation preferences.

What this means

Installing external development packages can introduce normal package-supply-chain risk in the user's project.

Why it was flagged

The skill documents optional installation of an external development proxy package. This is purpose-aligned for Whop local app development and is not shown as automatic installation.

Skill content
pnpm add -D @whop-apps/dev-proxy ... npm install --save-dev @whop-apps/dev-proxy ... The CLI binary is `whop-proxy`.
Recommendation

Install the proxy only when needed, prefer the official package source, pin versions where possible, and review project dependency changes.