Catallax
v1.0.0Interact with the Catallax decentralized contract work protocol on Nostr. Use when the user mentions tasks, bounties, contract work, arbiters, escrow, labor market, gigs, or Catallax. Supports browsing open tasks, creating task proposals, discovering arbiter services, submitting work deliveries, and managing the full task lifecycle (kinds 33400, 33401, 3402).
⭐ 2· 903·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description (Catallax on Nostr) align with the SKILL.md: it describes browsing tasks, creating proposals, discovering arbiters, submitting deliveries and concluding tasks. Requiring access to Nostr relays and the nak client is coherent with the purpose. However, the SKILL.md expects the agent/user to supply a signing secret (nsec) for publishing events but the skill metadata declares no required credentials or primaryEnv—this is an inconsistency.
Instruction Scope
Runtime instructions include concrete shell commands using nak and explicitly show passing --sec "<nsec>" (the user's private key) inline when publishing events. There is no guidance to use secure key storage, nor does the SKILL.md declare where the agent should obtain or store the nsec. Passing secrets on the command line risks exposure (shell history, process list) and the instructions give the agent discretion to publish signed events to multiple external relays, which could be abused if signing keys are mishandled.
Install Mechanism
No install spec and no code files — the skill is instruction-only, which minimizes installation risk. It relies on external tools (nak) being present but does not attempt to download or execute arbitrary installers.
Credentials
The SKILL.md effectively requires access to a Nostr private key (nsec) to perform publishes, but requires.env and primary credential are empty. That mismatch is concerning: a signing secret is a high-value credential and should be explicitly declared and handled with guidance for secure use (e.g., keyring, hardware signer, agent-hosted secure vault). The instructions also recommend publishing to several relays (external endpoints), which is expected for this protocol but increases the blast radius if a key is exposed.
Persistence & Privilege
No elevated persistence (always:false). The skill does not request or attempt to modify other skills or system-wide configs. Autonomous invocation is allowed by platform default but is not combined here with 'always' or other broad privileges.
What to consider before installing
This skill appears to implement the Catallax/Nostr workflow correctly, but it assumes access to your Nostr signing key (nsec) and shows examples of passing it inline to the nak CLI. Before installing or using: (1) don't paste your nsec into chat or into commands that will be stored in shell history—use a secure keyring, hardware signer, or nak's secure key management; (2) expect the skill to publish signed events to public relays—review every proposed publish before it runs; (3) ask the skill author how keys are obtained/stored (the skill metadata should declare required credentials but doesn't); and (4) if you only want read-only behavior, restrict the agent to queries and avoid providing signing material. If the author can document safe key-handling (explicit required credential and secure signing flow), this would reduce the main risk.Like a lobster shell, security has layers — review code before you run it.
bitcoinvk97ehqdm0kgmq3w9ah1exd28h980y4n0bountiesvk97ehqdm0kgmq3w9ah1exd28h980y4n0contractsvk97ehqdm0kgmq3w9ah1exd28h980y4n0crowdfundvk97ehqdm0kgmq3w9ah1exd28h980y4n0escrowvk97ehqdm0kgmq3w9ah1exd28h980y4n0latestvk97ehqdm0kgmq3w9ah1exd28h980y4n0nostrvk97ehqdm0kgmq3w9ah1exd28h980y4n0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
