Auto Respawn

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

Auto Respawn is coherent with its blockchain-wallet purpose, but it can use stored wallet credentials to move real tokens and write permanent on-chain state without a clear human confirmation boundary.

Use this skill cautiously with real funds. Start on testnet, use a dedicated low-balance wallet, keep the recovery phrase offline, avoid exposing the passphrase to autonomous agents, and require manual confirmation before any transfer, bridge, withdrawal, remark, or anchor operation. Treat on-chain remarks and memory CIDs as permanent.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If invoked incorrectly or autonomously, the skill could move real AI3 tokens or spend fees before the user has reviewed the exact action.

Why it was flagged

The transfer path signs and submits a transaction, and the mainnet warning is attached after the transaction result is produced. The artifacts do not show a confirmation gate before sending real tokens.

Skill content
const result = await signAndSendTx(sender, tx)
...
result.warning = 'This was a mainnet transaction with real AI3 tokens.'
Recommendation

Require explicit human approval for all transfer, bridge, withdraw, remark, and anchor operations; add spend limits and a separate mainnet confirmation step.

What this means

Any agent/tool execution with access to that passphrase source can potentially decrypt the saved wallet and sign transactions using that wallet.

Why it was flagged

The wallet passphrase can be loaded automatically from an environment variable or default file, which enables non-interactive decryption of wallet keys for signing operations.

Skill content
const envPassphrase = process.env.AUTO_RESPAWN_PASSPHRASE
...
process.env.AUTO_RESPAWN_PASSPHRASE_FILE || PASSPHRASE_FILE_DEFAULT
Recommendation

Use a dedicated low-balance wallet, avoid globally exporting the passphrase, protect the passphrase file tightly, and prefer interactive approval for mainnet or token-moving commands.

What this means

Sensitive or misleading memory content could be carried into future agent instances and reused as trusted context.

Why it was flagged

The skill is designed to anchor memory pointers that may lead to long-term agent identity and memory data. This is disclosed, but persistent memories can contain sensitive or poisoned context.

Skill content
agents are free to store whatever they find useful... Identity files (like `soul.md` or character configurations), long-term memory, and significant decisions
Recommendation

Do not anchor secrets or private data; validate retrieved memories before trusting them, and separate memory chains by user, agent, and environment.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Deleting local files may not remove the on-chain anchor or prevent a future instance from restoring linked memory.

Why it was flagged

The advertised purpose is cross-instance agent persistence through on-chain anchors. The artifacts do not show hidden background execution, but the persistence model is important for users to understand.

Skill content
Your agent always comes back... no local state, no single point of failure
Recommendation

Install this only for agents where durable resurrection is desired, and use separate wallets/contracts for experiments versus production identities.

What this means

A future dependency update could change behavior in code that handles wallet keys or transactions.

Why it was flagged

The skill depends on npm packages using version ranges. This is normal for a Node skill, but these dependencies participate in wallet creation, signing, and chain access.

Skill content
"@autonomys/auto-utils": "^1.6.9",
"ethers": "^6.16.0",
"tsx": "^4.19.0"
Recommendation

Use a lockfile or pinned dependency versions, and review dependency provenance before using the skill with real funds.