Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Codex Agentic Gateway
v1.0.0Use when the user wants to query the Codex Supergraph and the server returns a 402 challenge. Pays per query via the MPP 402 challenge flow. Only supports qu...
⭐ 0· 71·0 current·0 all-time
byNeal O'Grady@nealo
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill is described as an MPP (402) gateway for GraphQL queries and the instructions consistently focus on that flow. However, SKILL metadata lists no required binaries while the instructions rely on the Tempo CLI for Tempo-chain challenges — a missing declared dependency (incoherence).
Instruction Scope
Instructions stay within the stated purpose (construct query, handle 402, use Tempo to sign/pay). They tell the agent to run tempo wallet/login/whoami/request which are appropriate for the flow. Two caveats: (1) they instruct reading an external reference at ../codex-supergraph/references/query-templates.md (outside the packaged files) — if that file is not present the guidance may be incomplete; (2) the skill implicitly expects the user to fund a wallet and perform on-chain payments (expected for MPP but operationally significant).
Install Mechanism
The docs recommend installing Tempo with curl -fsSL https://tempo.xyz/install | bash. Piping a remote script to bash is high-risk because it executes code fetched from a remote host; the domain is not a standard audited package host (e.g., GitHub releases, official distro repos). This is the largest security concern.
Credentials
The skill declares no environment variables or credentials and the instructions do not request unrelated secrets. Wallet access and funding are required by design for MPP, and the skill explicitly warns not to print private keys.
Persistence & Privilege
The skill does not request persistent presence (always:false) and contains no instructions to modify other skills or system-wide agent settings. It doesn't require elevated privileges in the SKILL.md.
What to consider before installing
This skill appears to do what it says (handle Codex 402 payment challenges), but take these precautions before installing or using it:
- Do not blindly run curl ... | bash. Inspect the installer script at https://tempo.xyz/install first or prefer installing Tempo from a trusted package source or OS package manager.
- The SKILL metadata did not list the Tempo CLI as a required binary even though the docs depend on it — ensure you have a trusted Tempo binary before relying on the skill.
- Understand that using the skill will require funding a wallet (real USDC on Tempo) and performing payments on behalf of queries. Confirm cost and limits with the service.
- Verify the external reference files (especially ../codex-supergraph/references/query-templates.md) exist and match the GraphQL schema before constructing queries — the skill explicitly warns not to guess field names.
- If you are not comfortable auditing the tempo installer or giving a CLI permission to sign transactions, do not install or run it. Consider requesting an implementation that uses a vetted package or an alternative payment flow.
If you want, provide the actual installer script URL contents (or the full tempo installer) and I can help inspect it for obvious issues; that would raise confidence in the assessment.Like a lobster shell, security has layers — review code before you run it.
latestvk974797gs3c4wbh13xm0capd098361ar
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
