Monero Transaction Analysis

v1.0.0

Analyze Monero transactions by inspecting inputs, outputs, ring signatures, fund flows, and privacy features for forensic and verification purposes.

0· 89·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (Monero transaction forensics) match the SKILL.md content: it describes explorers, ring signatures, RingCT, pattern heuristics and example commands for analyzing tx data. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
All runtime instructions stay within the stated purpose (fetching and parsing Monero transactions, using xmrchain.net and local CLI tools). Note: the SKILL.md references a CLI 'monero-transaction' and 'Monero Block Explorer' CLI tools but provides no install or implementation — this is expected for an instruction-only skill but means the agent or user must have those tools available. The guide does not ask the agent to read unrelated local files or environment variables.
Install Mechanism
No install spec and no code files — lowest-risk pattern for a skill. Nothing will be downloaded or written by the skill itself.
Credentials
The skill requests no environment variables, secrets, or credentials. The included optional XMR tip address is expected for a public how-to and does not affect execution privileges.
Persistence & Privilege
always is false and model invocation is enabled (default). The skill does not request permanent presence or modify other skills or system settings.
Assessment
This guide is coherent with its stated purpose and does not request credentials, but keep these points in mind before installing/using it: 1) It's instruction-only — the example CLI ('monero-transaction') and any parser tools are not provided; ensure you trust and verify any third-party tools you install to follow the guide. 2) The analysis techniques are heuristic: false positives are possible — do not treat inferences as definitive proof. 3) Do not paste private keys, wallet files, or other sensitive secrets into any tools or prompts. 4) The guide references external sites (xmrchain.net) and Tor — be aware that fetching data from external explorers will make network requests; verify URLs and privacy claims yourself. 5) Consider legal and ethical constraints of blockchain forensics in your jurisdiction. If the skill later adds code, install steps, or requests credentials or network access, re-evaluate as that would change this assessment.

Like a lobster shell, security has layers — review code before you run it.

latestvk97d95a2jfekd81ma74ncnp0p9837j3m

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments