Back to skill
Skillv1.0.0

ClawScan security

Ntriq X402 Phish Radar Batch · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousApr 17, 2026, 12:00 PM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill's behavior (posting up to 500 user-supplied URLs to a third-party endpoint that expects a payment header) is coherent with its stated purpose but has small inconsistencies and privacy/payment risks that are not explained in the metadata.
Guidance
This skill will send up to 500 URLs/domains to a third-party endpoint and requires a payment header (X-PAYMENT) even though no credential is declared. Before installing: 1) Verify the provider (x402.ntriq.co.kr) and review privacy/terms — you may be sending sensitive URLs. 2) Do not store your payment/auth header in an unrestricted agent config; prefer providing it interactively per-call. 3) Test with non-sensitive sample URLs first to confirm behavior. 4) Confirm billing flow and refund policy (flat $9 USDC) and how the X-PAYMENT header is obtained/rotated. 5) If you need stronger privacy, prefer a local scanner or a provider that documents authentication and data retention. If you want me to, I can draft safer prompts for requesting the payment header from users or propose a workflow that avoids sending sensitive URLs.

Review Dimensions

Purpose & Capability
okName and description match the runtime instructions: the skill calls an external phish-scanning API to analyze batches of URLs. No unrelated binaries, installs, or credentials are declared, which aligns with a lightweight instruction-only integration.
Instruction Scope
concernThe SKILL.md instructs the agent to POST up to 500 (potentially sensitive) URLs to https://x402.ntriq.co.kr/phish-radar-batch with an X-PAYMENT header. Sending large batches of user URLs/domains to an external third party is a privacy/data-exfiltration risk and should be explicit to users. The doc also mentions "Local AI inference on Mac Mini" but provides no instructions for local inference—this is ambiguous and possibly misleading.
Install Mechanism
okInstruction-only skill with no install spec and no code files. No files are written to disk and nothing is auto-downloaded, which is the lowest-risk install model.
Credentials
concernNo required env vars or primary credential are declared, yet the API requires an X-PAYMENT header for a paid call. The skill fails to declare where the payment header should come from (env var, user prompt, or stored credential). That mismatch increases the chance a user or agent will supply secrets insecurely or the agent will attempt to send sensitive payment/auth data without clear guidance.
Persistence & Privilege
okalways is false and the skill does not request any persistent system-wide privileges or modify other skills. Autonomous invocation is allowed by default (disable-model-invocation=false) — this is normal but relevant to payment/privacy risks since an autonomous agent could make paid calls if given credentials.