Seisoai

ReviewAudited by ClawScan on May 10, 2026.

Overview

Seisoai is a coherent media-generation gateway, but it should be reviewed because its instructions allow paid x402 requests without clear user confirmation or spending limits.

Before installing, decide whether the agent is allowed to spend money through x402. Prefer a scoped API key, require explicit confirmation before paid calls, check prices first, and use the agent-scoped orchestration routes only for clearly requested tasks with an exact agent ID.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent has access to a compatible wallet or payment mechanism, it could incur USDC costs for media generation without a clearly documented confirmation step.

Why it was flagged

The skill instructs agents to fall back to a paid request mechanism, but the visible instructions make price checking optional and do not require user approval or spending limits before payment.

Skill content
"Optionally pre-price inputs" ... "Invoke with API key or x402" ... "If you do not have a key, use x402 pay-per-request."
Recommendation

Require an explicit user confirmation before any x402 payment, make price lookup mandatory, and document budget limits or per-request caps.

What this means

Using the skill may involve account credentials or wallet/payment authorization for Seisoai requests.

Why it was flagged

The skill needs provider API-key or payment authority, which is expected for this gateway, but users should notice that the registry metadata does not declare a primary credential.

Skill content
"Auth: `X-API-Key` or x402 payment (USDC on Base)."
Recommendation

Use a scoped project API key where possible, avoid sharing unrelated credentials, and confirm what wallet or payment authority is available to the agent.

What this means

Prompts, media references, or task context may be sent to specific Seisoai agent workflows when the user asks for that behavior.

Why it was flagged

The skill can invoke or orchestrate provider-side agents, but it also documents controls requiring explicit task need, exact agent binding, current credentials, tool allowlisting, and ambiguity stop conditions.

Skill content
"Agent-scoped: ... `POST /api/gateway/agent/{agentId}/invoke/{toolId?}` ... `POST /api/gateway/agent/{agentId}/orchestrate`" and "Default posture: deny by default for agent-scoped routes"
Recommendation

Only use agent-scoped routes for explicit user requests, verify the exact agent ID, and keep the documented allowlist and no-recursion safeguards in place.