Venice Ai

PassAudited by ClawScan on May 1, 2026.

Overview

The artifacts describe a coherent Venice AI API wrapper, with expected API-key, external-provider, media upload, and URL-fetching risks users should review.

This skill appears appropriate if you want a Venice AI CLI integration. Before installing, be comfortable providing a Venice API key, sending selected prompts/files/media to Venice, and paying any resulting API costs. Avoid giving it internal URLs, check model-specific privacy settings for sensitive data, and use dedicated credentials where possible.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone installing the skill must trust it with a Venice API key that can spend quota or access that Venice account's API capabilities.

Why it was flagged

The skill uses a Venice API credential and can read it from local configuration; this is expected for the service integration but is still privileged account access.

Skill content
API key read from `VENICE_API_KEY` environment variable (preferred)
- Fallback: read from `~/.clawdbot/clawdbot.json` config
- Key is sent only to `api.venice.ai` in the `Authorization` header
Recommendation

Use a dedicated Venice API key with the minimum practical scope or spending limits, and rotate it if the skill or host environment is no longer trusted.

What this means

Text, images, audio, video, and other supplied content may leave the local machine and be processed by Venice AI.

Why it was flagged

Prompts and user-selected files are sent to an external AI provider as the core function of the skill; this is disclosed and purpose-aligned, but it is a sensitive data boundary.

Skill content
`api.venice.ai` | Official Venice AI API — all inference requests ... User-specified input paths | Read-only | Load user-specified files for upload
Recommendation

Only send data you are comfortable sharing with the provider, and choose the model/privacy mode appropriate for sensitive material.

What this means

If an agent or user passes an internal URL such as localhost, a cloud metadata address, or a private service, the skill may fetch content that was not intended to be exposed.

Why it was flagged

The script can fetch arbitrary user-provided HTTP(S) URLs without host allowlisting or private-network blocking, then encode the result for API use.

Skill content
def _fetch_url_as_base64(url: str) -> str:
    """Download an HTTP(S) URL and return as raw base64 string."""
    req = urllib.request.Request(url, headers={"User-Agent": USER_AGENT})
    with urllib.request.urlopen(req, timeout=60) as resp:
Recommendation

Do not pass internal or sensitive URLs; in shared or server environments, add network egress controls or URL allowlisting before enabling URL-based commands.

What this means

A user might send highly sensitive data assuming all Venice-backed options have the same retention and privacy properties.

Why it was flagged

The skill makes strong privacy claims while also supporting many models and modes; the wording is partially qualified to private models, but users should not treat every model or feature as equally private.

Skill content
Venice offers **true privacy** with zero data retention on private models ... **Private inference** — Models marked "Private" have zero data retention. Process sensitive data without it leaking into training sets.
Recommendation

Verify Venice's current privacy terms and model-specific privacy labels before sending sensitive data, especially when using non-private or third-party frontier models.