Back to skill
Skillv0.1.0

ClawScan security

Bankr · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousFeb 28, 2026, 12:57 PM
Verdict
suspicious
Confidence
high
Model
gpt-5-mini
Summary
The skill's stated purpose (crypto trading + LLM gateway) mostly matches its instructions, but it instructs the agent to store API keys and modify other tools' config (e.g., OpenClaw), and to route LLM traffic through Bankr — behaviors that go beyond a simple trading integration and could expose credentials or change platform defaults.
Guidance
This skill does what it says (crypto trading + an LLM gateway) but contains several potentially risky instructions you should review before using it: - It asks you to create Bankr API keys (bk_...) and may instruct the CLI to generate wallets and keys headlessly. Prefer manual key creation in a web dashboard if you want more control. Do not paste keys into an agent session unless you trust the skill. - The skill recommends storing API keys and setting environment variables and even writes provider configs into other tools' config files (notably ~/.openclaw/openclaw.json). That can make Bankr the default LLM provider for other tools and route unrelated model traffic through bankr — which could leak other usage or credentials. Only allow this if you explicitly trust bankr.bot and have audited what will be written. - Choose least privilege when generating keys: use read-only keys unless you explicitly need trade/transfer/write permissions. Avoid enabling LLM gateway or read-write flags for keys you give to agents. - Before installing or running anything: verify the vendor (bankr.bot), look up the @bankr/cli package on npm (authors, source repo, recent audits), and inspect what the CLI writes to disk. Prefer installing from a verifiable source and review the package code if possible. - If you try this, test everything with minimal funds (tiny amounts) and avoid running raw calldata or arbitrary transaction submissions until you fully understand and trust the calldata. If you want, I can: (1) extract and show the exact config snippets the skill would write to ~/.openclaw/openclaw.json, (2) list the precise commands that would modify environment or config files so you can review them, or (3) suggest a safer, read-only workflow to query balances/prices without writing keys into other tool configs.

Review Dimensions

Purpose & Capability
noteName/description (crypto trading + LLM gateway) align with the instructions: CLI usage, REST API, wallet and transaction flows, on-chain operations, and an LLM gateway are all described. Requiring the `bankr` binary is coherent. However, the skill also instructs writing provider configs into other agent/tool config files (e.g., ~/.openclaw/openclaw.json) and recommending base URL overrides for other LLM SDKs — changes that expand the skill's impact beyond a single trading integration.
Instruction Scope
concernRuntime instructions explicitly direct the agent/user to create API keys, store keys in config files, set environment variables (e.g., BANKR_API_KEY, BANKR_LLM_KEY, ANTHROPIC_AUTH_TOKEN), and run bankr llm setup commands that write to ~/.openclaw/openclaw.json and other tool configs. The skill also provides raw-transaction submission guidance. While raw transactions are expected for a trading agent, modifying other tools' config and suggesting global env changes grants Bankr control over LLM routing and can cause credential/traffic redirection.
Install Mechanism
okThis is instruction-only (no install spec or code files). The recommended install commands are standard (bun / npm global install of @bankr/cli). No suspicious download URLs or archive extracts are present in the provided files.
Credentials
concernThe registry metadata declares no required env vars, yet the instructions repeatedly reference and instruct storing sensitive credentials: BANKR_API_KEY, BANKR_LLM_KEY, and instruct exporting ANTHROPIC_* vars and writing API keys into other tool configs. Asking the user to generate an API key (bk_...) and to enable read-write and LLM gateway access is expected for functionality, but the skill encourages placing keys into third-party configs and global env vars (which broadens credential exposure). There is no explicit declaration of what credentials the skill itself will need or retain.
Persistence & Privilege
concernThe skill recommends writing provider configuration (including an apiKey) into ~/.openclaw/openclaw.json and suggests running bankr llm setup --install which modifies other tools' config and sets Bankr models as defaults. That modifies other agent/tool configurations (system/user-level files) and can change the platform's default LLM routing — a material persistence/privilege increase beyond the skill's own files.