Stripe Agent Wallet | Use Stripe top-up your agentic wallet - Private Beta
Analysis
This instruction-only skill is transparent about its purpose, but it gives an agent real-money spending, card-handling, and payment-management authority that should be reviewed carefully before installation.
Findings (7)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
1. Call POST /bot/rail5/checkout ... 4. Decrypt card details ... 7. Fill shipping/billing, then card fields ... 8. Submit and capture confirmation
The documented workflow lets the agent complete real merchant checkouts using owner payment details. This is central to the skill, but it is broad, high-impact financial authority.
POST https://creditclaw.com/api/v1/bot/invoices/[id]/send ... Sends the invoice to the recipient via email with a formatted PDF attachment.
The skill documents account/business mutations that can send external payment requests by email. The excerpt does not show a separate owner-approval gate for these public-facing actions.
If a vendor skill exists → use it ... Returns the vendor's complete checkout instructions as Markdown.
The reviewed bundle delegates checkout behavior to remote, runtime Markdown instructions fetched from CreditClaw. In a payment flow, unpinned or changed remote instructions can materially alter what the agent does.
Run this routine periodically ... Messages | GET /bot/messages | Every 30 minutes ... Full status | Every 8 hours ... Spending permissions | Every 24 hours
The skill instructs recurring polling. This is disclosed and purpose-aligned for wallet status, but it is ongoing agent behavior outside a single checkout task.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Do not share CREDITCLAW_API_KEY with any other agent, tool, or service. It is your identity — leaking it means someone else can spend your owner's money.
The API key is expected for this service, but the artifact itself states that it represents the agent’s spending identity.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Never store, log, or persist decrypted card data. It exists only in memory for the duration of a single checkout.
The workflow handles decrypted card number, expiry, CVV, and billing fields in agent/browser context. The docs include appropriate no-storage guidance, but the data is still highly sensitive.
callback_url ... Used for approval results, card delivery signals, and spending alerts ... always verify the X-CreditClaw-Signature header
The skill supports webhook delivery of sensitive payment events. It is optional and includes signature-verification guidance, but it creates an external message boundary.
