WAIaaS Wallet

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If policies or prompts are too permissive, an agent could spend funds or create risky token approvals within the allowed wallet policy.

Why it was flagged

The skill exposes tools that can move assets, approve spenders, sign transactions/messages, and make automatic payments. This matches the wallet purpose and is described with policy controls, but it is high-impact authority.

Skill content
`send_token` — Send native (SOL/ETH) or tokens ... `approve_token` ... `sign_transaction` ... `x402_fetch` — HTTP 402 automatic payment
Recommendation

Use testnet first, set small per-transaction and cumulative limits, require human approval for meaningful value, whitelist tokens/contracts carefully, and avoid broad approvals.

What this means

Anyone or any process with the session token may be able to perform wallet actions allowed by that session's policies.

Why it was flagged

The MCP server is authorized using a session token. The artifact clearly discloses this and recommends safer storage, but the token represents delegated wallet permissions.

Skill content
export WAIAAS_SESSION_TOKEN="<session-token-from-quickset>" ... Store session tokens in environment variables or a secrets manager
Recommendation

Create least-privilege, per-wallet/per-agent sessions, keep tokens out of plaintext configs, rotate and revoke tokens regularly, and do not share one token across unrelated agents.

What this means

A compromised, changed, or unexpected MCP package version could misuse the wallet session token or run code in the user's environment.

Why it was flagged

The setup executes an external MCP package via npx and passes it the wallet session token. The supplied scan contains only SKILL.md, and the install spec covers @waiaas/cli rather than reviewed/pinned @waiaas/mcp code, creating a material provenance gap for a high-impact wallet integration.

Skill content
openclaw config set mcpServers.waiaas.command "npx"
openclaw config set mcpServers.waiaas.args '["@waiaas/mcp"]'
openclaw config set mcpServers.waiaas.env.WAIAAS_SESSION_TOKEN "${WAIAAS_SESSION_TOKEN}"
Recommendation

Install only from a trusted source, pin exact package versions, verify the package/repository, review the MCP server code before use, and restrict the session token's wallet permissions.

What this means

The wallet service may remain running and available to configured agents until the user stops it or revokes sessions.

Why it was flagged

The skill starts a local daemon with an admin UI. This persistence is expected for a self-hosted wallet service and is disclosed, but it continues outside a single chat turn.

Skill content
waiaas start                       # Start daemon ... Admin UI at `http://127.0.0.1:3100/admin`
Recommendation

Stop the daemon when not needed, protect the admin UI, set a strong master password, and use the kill switch or token revocation if anything looks wrong.