Talentir HumanPay

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This skill is transparent about its purpose, but it gives an agent direct authority to create real payouts and manage payment webhooks without clear human-confirmation safeguards.

Review this skill carefully before installing. It is not just informational: it can guide an agent to send real payments and manage production webhooks through a Talentir API key. Use minimal permissions, low daily limits, and require explicit human confirmation for every payment and webhook change.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill could initiate real payments from the connected Talentir account if it has the API key and sufficient permissions.

Why it was flagged

The skill documents direct API calls that create real payouts. The artifact does not add an instruction to obtain explicit user approval for the recipient, amount, currency, or final submission.

Skill content
curl -s -X POST "https://www.talentir.com/api/v1/payout" ... "payoutAmount": "100.00", "currency": "EUR"
Recommendation

Only install with strict spending limits and require a separate explicit confirmation step for every payout, including recipient, amount, currency, and purpose.

What this means

A broadly privileged Talentir API key could let the agent spend funds or approve payouts within the account’s limits.

Why it was flagged

The required API key can authorize payment operations, and the documented preApproved field indicates some keys may also approve payouts automatically. The skill does not specify least-privilege scopes or guardrails.

Skill content
Authorization: Bearer $TALENTIR_API_KEY ... `preApproved` ... `true` to auto-approve (requires `payout.api_approve` permission)
Recommendation

Use a least-privilege API key if available, avoid granting payout auto-approval unless absolutely required, and keep the daily allowance very low.

What this means

Users may underestimate the need for human review before an agent sends money.

Why it was flagged

The description explicitly frames the feature as letting agents bypass waiting for a human owner to take action, which is risky wording for a financial-payment capability.

Skill content
OpenClaw agents, you no longer have to wait for your "owner" to click a button in the physical world.
Recommendation

Treat this as a payment-authorization tool, not a convenience helper; require human approval before any payout or webhook change.

What this means

Payment event information could be sent to the configured webhook endpoint, and the signing secret could be misused if exposed.

Why it was flagged

Webhook creation is disclosed and purpose-aligned, but it can forward payout event data to a configured URL and produces a signing secret that must be protected.

Skill content
Create a webhook ... "targetUrl": "https://your-server.com/webhook", "eventType": "payout", "environment": "production" ... Save the returned `signingSecret` securely
Recommendation

Create webhooks only for trusted HTTPS endpoints, store the signing secret securely, and confirm the destination before enabling production events.