Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

HederaToolbox

Query live Hedera blockchain data — token prices, whale movements, HCS topics, governance proposals, identity/KYC screening, and smart contract analysis. Pay...

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 50 · 0 current installs · 0 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill claims to provide Hedera data, monitoring, KYC/sanctions checks, and HCS writes and requests only a Hedera account ID. That single env var (a public account identifier) is consistent with a billing-by-deposit model where the platform tracks deposits on-chain.
Instruction Scope
SKILL.md instructs the user to fund a platform wallet externally and set HEDERA_ACCOUNT_ID in the OpenClaw config. It explicitly sends query parameters and account IDs to api.hederatoolbox.com and may transmit identity/KYC inputs to the platform. The instructions do not request private keys or local files, but they do direct potentially sensitive data (KYC info, account IDs) off-platform which is expected for the described features — verify the privacy policy and what data is sent.
Install Mechanism
Instruction-only skill with no install spec or code files; nothing is written to disk by the skill itself. This is the lowest-risk install mechanism.
Credentials
Only HEDERA_ACCOUNT_ID is required (a public identifier). That is proportionate to the stated deposit-based billing. However, the skill enables identity/KYC and sanctions checks which will require sending PII or identifiers to the platform's API; the SKILL.md acknowledges data is sent to api.hederatoolbox.com, so users should confirm privacy/retention policies and the legitimacy of the platform before submitting sensitive data or deposits.
Persistence & Privilege
always is false and the skill does not request elevated system privileges. It requires storing HEDERA_ACCOUNT_ID in agent config (normal for a primaryEnv). Be aware that any env var in an agent's config can be read by other skills or by the agent when invoked, but the stored value is a public account ID rather than a secret key.
What to consider before installing
Before installing or funding this skill: 1) Verify the platform wallet address and the GitHub watcher source code link (https://github.com/mountainmystic/hederatoolbox) independently to ensure they match the published project; 2) Start with a very small test deposit (the skill itself recommends 2–5 HBAR) to confirm the deposit-watcher credibly credits your balance and that API interactions work as described; 3) Read the privacy policy to understand what identity, KYC, or account data will be transmitted and retained by api.hederatoolbox.com; 4) Remember that HEDERA_ACCOUNT_ID is a public identifier — storing it in agent config is not a secret but may be visible to other skills or logs; 5) Confirm pricing and that you are comfortable the platform can only spend your pre-funded balance (not pull funds from your wallet); and 6) If you plan to use identity/KYC or hcs_write_record features, audit the vendor's GitHub repo and confirm the operator's identity/trustworthiness before submitting more than a small test amount.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.0.3
Download zip
latestvk97dv21m7megaxt95b32vfydfn830hm3latest hedera hbar blockchain mcp web3vk97dv21m7megaxt95b32vfydfn830hm3

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Clawdis
EnvHEDERA_ACCOUNT_ID
Primary envHEDERA_ACCOUNT_ID

SKILL.md

HederaToolbox

Query live Hedera blockchain data using AI-native, pay-per-call tools. No registration, no API keys to manage — send HBAR to the platform wallet once, and your Hedera account ID becomes your permanent key.

What This Skill Does

When active, your agent can call 20 Hedera blockchain tools across 6 modules:

  • Token — HBAR/token price, whale movement alerts, deep token analysis
  • HCS — Query and monitor Hedera Consensus Service topics, anomaly detection
  • Compliance — Write and verify tamper-proof audit records on HCS
  • Identity — Resolve accounts, verify KYC status, sanctions screening
  • Governance — Monitor and analyze active proposals and vote splits
  • Contract — Read state, call functions, analyze smart contract activity

Setup (One Time)

  1. Get your Hedera account ID — format 0.0.XXXXXX. Any mainnet account works.
  2. Fund your balance — Send HBAR to the platform wallet 0.0.10309126 from your account. Your account ID becomes your API key within 10 seconds.
  3. Set the env var — Add HEDERA_ACCOUNT_ID=0.0.XXXXXX to your OpenClaw config.

Recommended starting balance: 10 HBAR (~$0.96 at current prices)

At 10 HBAR you get approximately:

  • 50 token price checks (0.10 ħ each), or
  • 13 deep token analyses (0.60 ħ each), or
  • A full compliance onboarding workflow (identity_resolve + identity_verify_kyc + identity_check_sanctions + hcs_write_record ≈ 6.70 ħ), or
  • Roughly 8 complete scheduled agent runs at the X agent profile (≈1.15 ħ/run)

Send more at any time — balance tops up within 10 seconds.

Security & Trust

Your private key is never requested, stored, or transmitted. This skill only uses your public Hedera account ID (0.0.XXXXXX). No wallet signing is required at any point.

How payment verification works: The platform runs a deposit watcher that polls the Hedera Mirror Node every 10 seconds for incoming transfers to the platform wallet (0.0.10309126). Hedera transactions cryptographically record the sender account ID on-chain — no memo or transaction hash is required from you. When a transfer is detected from your account, your balance is credited automatically. You can verify any deposit on Hashscan: https://hashscan.io/mainnet/account/0.0.10309126. The watcher source code is at https://github.com/mountainmystic/hederatoolbox/blob/master/src/watcher.js.

"Permanent key" clarification: Your Hedera account ID is a persistent billing identifier — not a cryptographic credential. The platform tracks which account sent HBAR using on-chain transaction records from the Mirror Node. Only the account that deposited HBAR can spend that balance.

On-chain writes: Tools like hcs_write_record write HCS messages signed by the platform operator key (server-side, using the platform's own Hedera account). Your account ID is included in the message payload as the originator field — it is metadata, not a transaction signer. The transaction itself is signed by and appears on-chain as originating from the platform account (0.0.10309126), not yours. This is standard for metered API services on Hedera.

Payment model: You send HBAR using your own wallet (HashPack, Blade, CLI, etc.) before using the skill. The skill itself never initiates transfers or requests funds. All charges are deducted from your pre-funded balance only — the platform cannot pull additional funds from your wallet.

Data sent off-platform: Tool calls (account IDs, contract addresses, token IDs, query parameters) are sent to api.hederatoolbox.com. See the Privacy Policy at https://hederatoolbox.com/privacy.html for retention and sharing details.

Start small: Test with 2–5 HBAR before committing more. Full source: https://github.com/mountainmystic/hederatoolbox

Tool Pricing (HBAR)

ModuleToolCost
Freeget_terms, confirm_terms, account_info0 ħ
HCShcs_monitor, hcs_query0.10 ħ
HCShcs_understand1.00 ħ
Compliancehcs_write_record5.00 ħ
Compliancehcs_verify_record1.00 ħ
Compliancehcs_audit_trail2.00 ħ
Governancegovernance_monitor0.20 ħ
Governancegovernance_analyze1.00 ħ
Tokentoken_price0.10 ħ
Tokentoken_monitor0.20 ħ
Tokentoken_analyze0.60 ħ
Identityidentity_resolve0.20 ħ
Identityidentity_verify_kyc0.50 ħ
Identityidentity_check_sanctions1.00 ħ
Contractcontract_read0.20 ħ
Contractcontract_call1.00 ħ
Contractcontract_analyze1.50 ħ

MCP Endpoint

https://api.hederatoolbox.com/mcp

Standard MCP-over-HTTP. Compatible with any MCP client.

When To Use This Skill

Use HederaToolbox tools when the user asks about:

  • HBAR price or market datatoken_price
  • Whale activity or unusual transferstoken_monitor
  • Deep token risk analysistoken_analyze
  • Reading or monitoring an HCS topichcs_monitor or hcs_query
  • Detecting anomalies in HCS traffichcs_understand
  • Writing a compliance record on-chainhcs_write_record
  • Verifying an existing compliance recordhcs_verify_record
  • Full audit trail for an account or topichcs_audit_trail
  • Resolving a Hedera account identityidentity_resolve
  • KYC status for a tokenidentity_verify_kyc
  • Sanctions screeningidentity_check_sanctions
  • Active governance proposalsgovernance_monitor
  • Voter sentiment and participationgovernance_analyze
  • Smart contract statecontract_read
  • Calling a contract functioncontract_call
  • Contract activity patterns and riskcontract_analyze
  • Checking balance or platform infoaccount_info

Example Agent Prompts

Check the current HBAR price and look for any whale activity in the last hour.
Monitor HCS topic 0.0.10353855 and tell me if there's anything unusual.
Run a KYC check on account 0.0.7925398 for token 0.0.731861.
Analyze the SaucerSwap contract 0.0.1460200 and give me a risk summary.
What are the active governance proposals for SAUCE token right now?

Tool Call Format

All tools follow the same MCP pattern. Pass your account ID as api_key:

{
  "tool": "token_price",
  "arguments": {
    "tokenId": "0.0.1456986",
    "api_key": "0.0.YOUR_ACCOUNT_ID"
  }
}

The agent reads HEDERA_ACCOUNT_ID from the environment and passes it automatically.

Checking Your Balance

Ask the agent: "What's my HederaToolbox balance?"

This calls account_info (free) and returns your remaining balance in HBAR.

Topping Up

Send additional HBAR to 0.0.10309126 from your account at any time. Balance updates within 10 seconds.

What You Could Build

  • Compliance onboarding agent — resolve + KYC + sanctions + write HCS record for any Hedera account. Board-ready audit trail in one workflow (~6.70 ħ total).
  • Whale alert bot — run token_monitor on a schedule, surface unusual transfers to Telegram or Slack.
  • DAO governance digest — daily governance_monitor + governance_analyze summary for any token with active proposals.
  • Smart contract due diligencecontract_analyze + identity_resolve on all callers, output a risk report.
  • On-chain market pulsetoken_price + token_monitor twice daily, draft a tweet or Slack summary from the data.

Links

Files

1 total
Select a file
Select a file to preview.

Comments

Loading comments…