Zhentan
Analysis
Zhentan is transparent about being a crypto co-signer, but it gives a remote service and bearer secret high-impact authority to approve and execute on-chain transactions.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Run each command immediately... curl -s -X POST https://api.zhentan.me/execute ... -d '{"txId":"tx-XXX","callerId":"telegram:<origin.from>"}'The skill instructs the agent to call an execution endpoint that co-signs and executes a transaction based on a txId. This is purpose-aligned for a co-signer, but it is a high-impact financial action with no artifact-shown secondary confirmation or bounded scope.
APPROVE (risk < 40): auto-executes on-chain... Safe transactions are auto-signed and executed instantly.
The described pipeline can turn an automated risk classification into immediate on-chain execution. A bad classification or bad queued transaction could propagate into an irreversible financial action.
Source: unknown; Homepage: none; No code files present — this is an instruction-only skill.
There is no local implementation to inspect and no public source or homepage in the supplied metadata. For a high-impact remote co-signer, this provenance gap is important even though no hidden local code is present.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Authorization: Bearer $AGENT_SECRET ... If origin.from is unavailable, omit callerId rather than sending a placeholder.
The bearer secret is required on every request and appears to be the primary privileged credential, while the per-user caller identity is allowed to be omitted. The artifact therefore does not clearly bound privileged actions to an authenticated Telegram user.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
It learns how you transact — amounts, timing, tokens and recipients — and screens every pending transaction against your behavioral profile and external security scanners (GoPlus, Honeypot.is, De.fi).
The skill discloses persistent behavioral profiling and use of external security scanners. This is aligned with the security purpose, but transaction behavior and counterparties can be sensitive and influence future automated decisions.
