A2A SHIB Payment System

WarnAudited by ClawScan on May 10, 2026.

Overview

This is a coherent crypto-payment skill, but it may control a Polygon wallet and accept agent-to-agent payment commands without clearly documented transaction approval, credential declaration, or communication boundaries.

Review this carefully before installing. If you use it, configure only a dedicated low-balance wallet, verify the Node package and dependencies, keep the service bound to localhost unless properly authenticated, require manual approval for every transaction, and protect or encrypt all state, audit, auth, and wallet files.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken, manipulated, or over-autonomous agent command could send crypto or release escrowed funds.

Why it was flagged

The skill exposes direct financial and escrow-mutating operations as message-text commands. The artifacts mention security features, but they do not clearly show mandatory user approval, transaction previews, allowlists, or hard limits before funds can move.

Skill content
`send [amount] SHIB to [address]` ... `escrow fund [id]` ... `escrow release [id]`
Recommendation

Require explicit human confirmation for every payment or escrow release, use dry-run previews, set low default amount limits, restrict recipients with allowlists, and log approvals separately from agent-generated commands.

What this means

If the agent, local files, or exposed endpoint are misused, funds in the configured wallet may be at risk.

Why it was flagged

A raw wallet private key grants spending authority over the wallet. This is especially concerning because the registry metadata declares no required environment variables and no primary credential.

Skill content
`WALLET_PRIVATE_KEY` - Your Polygon wallet private key
Recommendation

Declare the wallet credential in metadata, use a dedicated low-balance hot wallet, avoid main wallets, prefer hardware-wallet or multisig flows for production, and document exactly which operations can use the key.

What this means

If the service is reachable by other local or remote agents, they may be able to submit payment-related commands unless authentication is enforced elsewhere.

Why it was flagged

The integration examples let other agent frameworks forward arbitrary text to the payment endpoint, but the shown calls do not include authentication, caller identity, or authorization boundaries.

Skill content
description: "Send SHIB payments, create escrows, negotiate prices, check reputation" ... fetch("http://localhost:8003/a2a/jsonrpc", { method: "POST", headers: { "Content-Type": "application/json" }
Recommendation

Require API keys or signed A2A messages for all sensitive endpoints, bind to localhost by default, avoid public exposure until hardened, and authorize payment actions per caller identity.

What this means

A long-running payment service can remain exposed or keep using wallet credentials if the user forgets it is running.

Why it was flagged

The deployment guide describes a persistent always-on payment agent and optional public tunnel. This is user-directed and coherent with a payment service, but users should understand the service can keep operating after setup.

Skill content
Recommended: Cloudflare Tunnel + Systemd ... `Restart=always` ... `Agent auto-starts on boot.`
Recommendation

Only enable auto-start when needed, monitor logs, stop the service when not in use, and do not expose it publicly without hardened authentication and network controls.

What this means

Users have less registry-level assurance about where the installable package came from.

Why it was flagged

The Node/npm install mechanism is expected for this project, but the registry provenance is not clearly declared in the supplied metadata.

Skill content
Source: unknown; Homepage: none; Install specifications: node | package: .
Recommendation

Verify the repository, package.json, dependency lockfile, and npm install scripts before installing, especially because the skill handles wallet credentials.

What this means

Transaction history, reputation data, auth configuration, and wallet material could be exposed through backups or local file access if permissions are weak.

Why it was flagged

The skill stores persistent payment, escrow, reputation, audit, auth, and wallet-related files. This is expected for the stated system, but it creates retained sensitive state that must be protected.

Skill content
Critical Files: escrow-state.json, negotiation-state.json, reputation-state.json, auth-config.json ... Audit logs: audit-logs/*.jsonl ... Wallet: .env.local
Recommendation

Use strict file permissions, encrypt backups, exclude wallet files from routine archives unless securely stored, and document retention and deletion procedures.