Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Ntriq X402 Document Intel

v1.0.0

Extract text, classify document type, and pull tables from any document image. Pay $0.05 USDC per call via x402 (no API key needed).

0· 60·1 current·1 all-time
byntriq@ntriq-gh

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for ntriq-gh/ntriq-x402-document-intel.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Ntriq X402 Document Intel" (ntriq-gh/ntriq-x402-document-intel) from ClawHub.
Skill page: https://clawhub.ai/ntriq-gh/ntriq-x402-document-intel
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install ntriq-x402-document-intel

ClawHub CLI

Package manager switcher

npx clawhub@latest install ntriq-x402-document-intel
Security Scan
Capability signals
CryptoRequires walletCan make purchasesRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The description repeatedly claims "local AI vision" and "No cloud upload," but SKILL.md instructs the agent to POST images (or base64) to https://x402.ntriq.co.kr/document-intel — i.e., remote processing. That contradiction is disproportionate to the stated purpose and misleading.
!
Instruction Scope
Instructions tell the agent to transmit document images (via URL or base64) to an external endpoint and to include an EIP-3009-signed payment header. This directs the agent to send potentially sensitive document content off‑agent and to perform a payment-signing flow not described in the metadata. The SKILL.md does not explain how to obtain or safely sign the required payment payloads.
Install Mechanism
No install spec and no code files — instruction-only. This minimizes local persistence and install-time risk.
!
Credentials
The skill declares no required environment variables or credentials, yet the runtime requires signing an on‑chain payment (EIP-3009), which implicitly needs wallet access/private-key signing or an external wallet UI. The lack of declared credential requirements is inconsistent and hides a material requirement (ability to sign/pay).
Persistence & Privilege
always:false and no install steps; the skill does not request elevated or persistent platform privileges.
What to consider before installing
This skill is suspicious because it markets "local" processing while instructing you to upload documents to a remote server and pay $0.05 USDC per call. Before installing or using it: (1) Do not send sensitive documents until you confirm the provider's privacy policy and data retention practices. (2) Understand the payment flow — EIP-3009 requires signing a payload with your wallet; never paste your private key into an agent. Use a trusted wallet UI to sign and verify the recipient address (0x124AaFfF8Ef45F2cA953807aF09Aacec2D9F8307). (3) Verify the service domain and TLS certificate and consider testing with non-sensitive images. (4) If you require strictly local processing, this skill does not provide it despite its marketing. (5) If you need more assurance, ask the publisher for a clear explanation of how payments are signed, whether image data is stored, and a privacy/security whitepaper; lack of those answers is a red flag.

Like a lobster shell, security has layers — review code before you run it.

latestvk9754tvn3rsys6wj4vgfyecmp58519y5
60downloads
0stars
1versions
Updated 1w ago
v1.0.0
MIT-0

Document Intelligence (x402)

Analyze document images — invoices, contracts, forms, reports — with local AI vision. Extracts text, classifies document type, pulls tables, or summarizes. No cloud upload, no API key. Pay $0.05 USDC per call via x402 micropayment (Base mainnet).

How to Call

POST https://x402.ntriq.co.kr/document-intel
Content-Type: application/json
X-PAYMENT: <x402-payment-header>

{
  "image_url": "https://example.com/document.png",
  "analysis_type": "extract"
}

The server responds with 402 Payment Required first. Sign the EIP-3009 payment payload and retry with X-PAYMENT header.

Parameters

ParameterTypeRequiredDescription
image_urlstring✅ (or base64)Publicly accessible URL of document image
image_base64string✅ (or url)Base64-encoded document image
analysis_typestringextract (default), summarize, classify, table
languagestringOutput language ISO code (default: en)

analysis_type Options

ValueWhat it does
extractFull text extraction preserving structure
summarizeKey points, dates, amounts, parties
classifyDocument type + key metadata
tableAll tables as JSON array

Example Response

{
  "status": "ok",
  "analysis_type": "classify",
  "analysis": "invoice",
  "confidence": 0.97,
  "metadata": {
    "vendor": "Acme Supplies Ltd.",
    "invoice_number": "INV-2024-0847",
    "date": "2024-03-15",
    "total": "$475.00"
  }
}

Payment

  • Price: $0.05 USDC per call
  • Network: Base mainnet (EIP-3009 gasless)
  • Protocol: x402
  • Wallet: 0x124AaFfF8Ef45F2cA953807aF09Aacec2D9F8307
# Service catalog
curl https://x402.ntriq.co.kr/services

Comments

Loading comments...