Bytesagain Wallet Tracker
v1.0.0Crypto wallet analytics reference — address formats, on-chain analytics, transaction tracing, hardware wallets, and approval revocation
⭐ 0· 29·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (crypto wallet analytics and reference) match the artifacts: SKILL.md documents commands that produce reference text and the included script implements those text outputs. There are no unrelated credentials, binaries, or install steps.
Instruction Scope
SKILL.md explicitly says outputs are reference documentation only, no network access and no credentials required. The visible portions of scripts/script.sh implement command handlers that emit heredoc docs. There are no instructions to read unrelated system files, query env vars, or transmit data.
Install Mechanism
No install spec is present (instruction-only). No downloads, package installs, or archive extraction are requested, which is lowest-risk for persistence and disk writes.
Credentials
The skill declares no required environment variables, primary credential, or config paths. Nothing in SKILL.md or the visible script requires secrets or external API keys, which is proportionate to a documentation/reference skill.
Persistence & Privilege
always is false (default) and the skill does not request elevated or permanent presence. It does not modify other skills or system-wide settings based on available artifacts.
Assessment
This skill appears to only emit static reference documentation and does not ask for credentials or perform network calls. If you plan to install/run it anyway: (1) review the full scripts/script.sh content locally (the provided snippet prints docs but verify there are no hidden network calls in the truncated portion), (2) avoid granting any separate credentials or elevated agent permissions, and (3) run it in a sandbox or limited-permission environment if you are concerned about letting the agent execute shell scripts.Like a lobster shell, security has layers — review code before you run it.
latestvk97fmw67rqyw50fqc7bpbxyerd847kby
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
