tss-api
v1.0.5提供跨链交易查询服务,包括获取交易高度、交易列表、订单和交易哈希对应的详细跨链交易记录与状态。
⭐ 0· 145·0 current·0 all-time
bymap@lbtsm
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description describe a cross-chain transaction query API and the SKILL.md only documents GET endpoints on the listed base URL. There are no unrelated requirements (no credentials, binaries, or config paths) requested that would be inconsistent with a read-only query API.
Instruction Scope
SKILL.md contains only API documentation (endpoints, params, examples). It does not instruct the agent to read local files, environment variables, or transmit data to unexpected endpoints. The documented external endpoint (https://tss-api.chainservice.io) is the only network target mentioned, which matches the stated purpose.
Install Mechanism
There is no install spec and no code files. This instruction-only skill does not write to disk or install packages, which is the lowest risk install model.
Credentials
The skill declares no required environment variables, credentials, or config paths. That matches the read-only, query-only nature of the documented API.
Persistence & Privilege
The skill does not request always: true and uses default invocation settings. It does not ask to modify other skills or system config and has no persistent installation actions.
Assessment
This skill is essentially API documentation and appears coherent and low-risk: it requires no credentials or installs. Before installing, consider that the base URL (https://tss-api.chainservice.io) is an external service with an unknown provider—verify you trust that endpoint, check its TLS certificate and uptime, and be aware that any queries you make will be sent to that external server. Do not provide private keys or sensitive credentials to this skill (none are required). If you need stronger assurance, request a homepage, source repository, or operator contact so you can vet the service operator and their privacy/retention practices.Like a lobster shell, security has layers — review code before you run it.
latestvk972cv4jxj1dyws39crj9b67mn83mcew
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
