Crypto Market Data Skill (No Key Required)

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: crypto-market-data Version: 1.0.2 The skill bundle is classified as suspicious due to a critical vulnerability in `scripts/api_client.js`. The `BASE_URL` for API calls can be overridden by the `API_BASE_URL` environment variable. If an attacker can control the environment where this skill runs, they could redirect all API traffic, including the session token stored in `.token`, to an arbitrary malicious server, leading to potential data exfiltration and session hijacking. While the default `BASE_URL` points to a legitimate domain (`https://api.igent.net/api`), the flexibility to override it without explicit sanitization or restriction constitutes a significant security risk, even if not intentionally malicious within the skill's design.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You have less external provenance information to verify who maintains the skill or the associated service.

Why it was flagged

The skill's registry metadata does not provide an upstream source or homepage, so provenance is limited even though the included source code is small and dependency-free.

Skill content
Source: unknown; Homepage: none
Recommendation

Review the included code and only install if you trust the publisher and the api.igent.net service.

What this means

The market-data provider can see the symbols and search terms you request, along with normal request metadata.

Why it was flagged

The skill sends requested coin IDs, stock symbols, currencies, and search terms as query parameters to an external API provider; the destination can also be changed via API_BASE_URL.

Skill content
const BASE_URL = process.env.API_BASE_URL || 'https://api.igent.net/api'; ... parsed.searchParams.set(key, value);
Recommendation

Use the default endpoint unless you intentionally trust another API_BASE_URL, and avoid entering non-market sensitive information as search text.

What this means

This is not a user-supplied API key, but it is credential-like local state that could be reused until it expires if someone else can read the skill directory.

Why it was flagged

The API client automatically obtains a provider token and stores it in a hidden local .token file for reuse.

Skill content
const TOKEN_FILE = path.join(__dirname, '.token'); ... fs.writeFileSync(TOKEN_FILE, JSON.stringify(data));
Recommendation

Keep the skill directory private and delete scripts/.token if you want to clear the cached provider session.