W3connect

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill is meant for crypto payments, but it tells the agent to call an unreviewed local wallet service with 2FA codes and no clear transaction-confirmation limits.

Use this only if you recognize and trust the local service running on 127.0.0.1:5333. Before giving any authenticator code, verify the exact chain, token, amount, recipient address or email, and fees, and consider disabling autonomous agent invocation for payment actions.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent uses the wrong recipient, token, chain, or amount after receiving a code, funds could be sent irreversibly.

Why it was flagged

This raw HTTP request is documented as the way to send ETH or USDC. The artifacts do not require a separate transaction preview, user confirmation, or limits on recipient and amount before the agent can call it.

Skill content
curl http://127.0.0.1:5333/send?code=[code]&chain=[chain]&to_address=[to_address]&token=[token]&amount=[amount]
Recommendation

Require explicit user confirmation of the exact chain, token, amount, recipient/email, and fee before every transfer; prefer wallet-native signing prompts or a safer scoped payment interface.

What this means

Providing a 2FA code may let the agent authorize a payment during the code’s validity window, beyond what the user intended if the transaction details are not tightly checked.

Why it was flagged

The authenticator code is a delegated authorization factor for wallet transactions. The skill treats it as an agent parameter and the registry does not declare a credential contract for this authority.

Skill content
Pass the paramters with the Google or Microsoft Authenticator One Time Pass `code` to verify.
Recommendation

Only provide a code after reviewing the exact transaction in a trusted interface. The skill should declare its credential requirements and avoid passing one-time codes in URL query strings.

What this means

Users cannot verify from these artifacts what software is actually receiving the authenticator code, signing transactions, or calling the payment API.

Why it was flagged

The artifacts provide no reviewed implementation or provenance for the localhost wallet service that the skill relies on for high-impact financial transfers.

Skill content
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill; No code files present
Recommendation

Provide a trustworthy source, install instructions, pinned/auditable implementation, and a clear description of the localhost service and its security model.

What this means

Recipient email addresses and payment details may be shared with an external payment service.

Why it was flagged

Pay-to-email necessarily sends recipient email and transaction-related data through a payment API, but the artifacts do not describe the API endpoint, retention, or privacy boundaries.

Skill content
We need an on-chain call and then an API call to PUSDC. ... to_email: The email address we are sending to.
Recommendation

Use this only when the recipient email can be shared with the payment provider, and request clearer documentation of the provider endpoint and data handling.