openclaw skill for swarms ai

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill is mostly coherent Swarms API documentation, but it includes high-impact Solana wallet private-key workflows that are under-declared and need careful review before use.

Review this skill carefully before using payment or token-launch features. The ordinary Swarms API examples are expected, but do not provide a main Solana wallet private key; use a low-balance burner wallet, verify endpoints, and set strict limits for autonomous swarms and MCP tools.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using a main wallet key here could expose funds or allow irreversible token/financial actions if the endpoint, code, or operator is not trusted.

Why it was flagged

The skill instructs users to send a Solana wallet private key to an external token-launch endpoint. A wallet private key grants full control over funds in that wallet, and the registry metadata declares no primary credential.

Skill content
"private_key": "[1,2,3,...]"  # Solana wallet private key ... "https://swarms.world/api/token/launch"
Recommendation

Only use a dedicated low-balance wallet, verify the Swarms endpoint independently, review all costs and transactions, and avoid providing any wallet key that controls important assets.

What this means

A service receiving this header may be able to control the wallet, not just collect a limited payment.

Why it was flagged

The ATP payment flow documents sending a wallet private key in a request header. That is a high-impact credential exposure pattern even though it is disclosed as part of the payment protocol.

Skill content
Client sends request with wallet private key in header ... wallet_private_key_header="x-wallet-private-key"
Recommendation

Prefer protocols that sign transactions locally or use scoped payment authorization; if this workflow is unavoidable, use a separate low-balance wallet and trusted endpoints only.

What this means

A loosely configured swarm could spawn work beyond what the user intended or create unexpected provider costs.

Why it was flagged

The skill documents autonomous sub-agent delegation and a fire-and-forget mode. This is aligned with multi-agent orchestration but can continue work or incur costs if not bounded.

Skill content
`max_loops`: `"auto"` (enables autonomous agent loop) ... `selected_tools`: `"all"` ... `wait_for_completion: false` — fire-and-forget
Recommendation

Set explicit loop limits, avoid `selected_tools: "all"` unless needed, and avoid fire-and-forget mode for sensitive or costly tasks.

What this means

Prompts, tasks, or bearer tokens could be shared with an MCP server the user configures.

Why it was flagged

The skill supports connecting agents to arbitrary MCP servers with authorization headers. This is a normal integration pattern, but it expands trust and data boundaries.

Skill content
"mcp_config": { "url": "https://your-mcp-server.com", "headers": {"Authorization": "Bearer ..."} }
Recommendation

Connect only to trusted MCP servers, use scoped tokens, and avoid sending sensitive tasks or credentials to unverified endpoints.

What this means

Installing the wrong or compromised package could affect the local Python environment.

Why it was flagged

The skill recommends installing an external SDK without a pinned version. This is user-directed and expected for an API integration, but users should verify the package source.

Skill content
**Python SDK:** `pip install swarms-client`
Recommendation

Verify the package name and publisher, consider pinning a known-good version, and install in a virtual environment.