x402 Private Search

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill matches its stated x402 paid-search purpose, but it can automatically sign crypto payments for arbitrary endpoints without visible price or service limits.

Install only if you are comfortable with a tool that can sign x402 payments from a wallet. Use a dedicated low-balance Base Sepolia wallet, verify the service URL and price before each request, avoid sensitive search terms, and do not reuse valuable private keys.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent is pointed at a costly or untrusted x402 endpoint, the wallet may sign and pay without the user reviewing the payment terms first.

Why it was flagged

The script accepts an arbitrary URL, registers the wallet signer, and uses payment-wrapped fetch automatically. The artifacts do not show a max spend, recipient allowlist, network restriction, or explicit approval before payment signing.

Skill content
const url = args[0]; ... registerExactEvmScheme(client, { signer }); const fetchWithPayment = wrapFetchWithPayment(fetch, client); ... const response = await fetchWithPayment(url, fetchOpts);
Recommendation

Require explicit user confirmation for each payment, enforce a maximum price and expected network, and restrict payments to trusted service URLs.

What this means

Anyone or any process with access to the private key can spend from that wallet; reusing a valuable wallet would increase the risk.

Why it was flagged

The skill uses an EVM private key for payment signing. This is purpose-aligned, but it is sensitive authority and is under-declared by the registry metadata, which lists no primary credential or required environment variables.

Skill content
export X402_PRIVATE_KEY=$(cat ~/.x402-client/wallet.key) ... Or pass `--key-file ~/.x402-client/wallet.key` to each request.
Recommendation

Use a dedicated low-balance Base Sepolia wallet, do not reuse mainnet or personal keys, protect the key file, and declare the credential requirement in metadata.

What this means

A compromised or unexpectedly changed dependency could affect how wallet signing or paid requests are handled.

Why it was flagged

The user-directed setup installs external npm packages using version ranges, so future dependency updates could change payment-signing behavior outside the reviewed artifacts.

Skill content
"dependencies": { "@x402/fetch": "^2.3", "@x402/evm": "^2.3", "viem": "^2.0" } ... npm install --quiet
Recommendation

Pin exact dependency versions, provide a lockfile, and install only after reviewing the package sources.

What this means

Search queries and paid requests are sent to an external, changing service endpoint, which may not be appropriate for sensitive searches.

Why it was flagged

The known search gateway is a transient Cloudflare tunnel. This is disclosed, but the endpoint identity and stability are weak for a paid search provider.

Skill content
URL: `https://nicholas-hopefully-plumbing-troubleshooting.trycloudflare.com` ... `This URL is a quick Cloudflare tunnel and may change on service restart.`
Recommendation

Verify the service operator and price before use, and avoid sending sensitive queries unless you trust the gateway.