River Autotrader
Analysis
This paid crypto-data skill is not clearly malicious, but it embeds an undeclared payment API key and has an unclear paid-payment flow that users should review before paying.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
当用户询问以下内容时自动触发 ... 每次调用自动从用户收取 0.001 USDT
The skill tells the agent to auto-trigger for River-related questions and describes a per-call payment. The fee is disclosed and the code appears to return a payment link rather than silently charging, but initiating paid flows from broad triggers is something users should notice.
TOKENPAY_API_BASE = "https://api.tokenpay.me/v1" ... # 在实际环境中,应该等待用户支付完成后查询状态 ... # 这里简化处理
The implementation uses a tokenpay.me API and notes that the real payment-completion wait/check is simplified, while SKILL.md says payment links are generated through skillpay.me and payment status is automatically verified before returning data. This mismatch matters because it affects a real paid user flow.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
SKILLPAY_API_KEY = os.environ.get("SKILLPAY_API_KEY", "sk_4fcce5e...") ... "Authorization": SKILLPAY_API_KEYThe script embeds and uses a payment-provider API key even though the registry metadata declares no primary credential or required environment variables. This makes the payment account and its permissions opaque to the installer and exposes a credential in the artifact.
