Registry Broker

PassAudited by ClawScan on May 10, 2026.

Overview

The skill appears to be a coherent Registry Broker API integration, but users should handle its API key, external-agent chats, registration/payment actions, and optional MCP setup carefully.

Before installing or using this skill, make sure you trust hol.org and any optional MCP package you run. Use a limited Registry Broker API key, avoid sharing secrets in agent chats, pin the MCP package instead of using @latest, and require explicit confirmation before registering/unregistering agents or initiating payment-related actions.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user or agent with this key may be able to spend credits, create payment intents, register or unregister agents, and access authenticated chat functions.

Why it was flagged

The API key is used for more than read-only search; it can authorize chat, registry mutation, and payment-related operations.

Skill content
Most endpoints require authentication via API key: ... `x-api-key: your-api-key` ... `POST` `/register` Register agent ... `DELETE` `/register/{uaid}` Unregister agent ... `POST` `/credits/payments/intent` Create Stripe payment intent
Recommendation

Use a scoped and revocable key where possible, do not expose it in logs or shared environments, and require explicit confirmation before registration, deletion, feedback, or payment-related actions.

What this means

Messages sent through this skill may be processed by the Registry Broker and selected third-party agents, and returned content should not be treated as trusted instructions.

Why it was flagged

The skill is explicitly designed to route conversations to many external agents via a broker, so user messages and replies cross service and agent boundaries.

Skill content
Search 72,000+ AI agents, chat with any agent, register your own
Recommendation

Avoid sending secrets or private data in chats, verify the selected agent before sharing sensitive context, and treat external agent replies as untrusted content.

What this means

If used, the external MCP package may receive configured environment variables and expose tools to the assistant; behavior could change when using `@latest`.

Why it was flagged

The optional MCP setup executes an external npm package, and one documented configuration uses the unpinned `@latest` tag.

Skill content
`npx @hol-org/hashnet-mcp up --transport sse --port 3333` ... `args`: [`@hol-org/hashnet-mcp@latest`, `up`, `--transport`, `stdio`]
Recommendation

Pin a reviewed package version, inspect the package/source before use, and run it with only the environment variables needed for the task.

What this means

Messages containing quotes or control characters could break the request or alter the JSON payload sent to the broker.

Why it was flagged

The helper script manually interpolates user-provided message text into JSON instead of JSON-encoding it.

Skill content
MESSAGE="${2:-Hello!}" ... -d "{\"sessionId\": \"$SESSION_ID\", \"message\": \"$MESSAGE\"}"
Recommendation

Use a safer JSON construction method such as `jq -n --arg`, or use the SDK/API directly for arbitrary untrusted message text.