Generated source template injection
- Finding
- User-controlled placeholder is embedded directly into generated source code.
Security checks across static analysis, malware telemetry, and agentic risk
This is a coherent Web3 reference skill; the main cautions are user-directed examples that can install tooling or use private keys for real blockchain actions.
This skill appears safe to use as documentation. Before installing or using it, remember that Web3 examples can affect real funds if executed against live networks: review any install, deploy, broadcast, transfer, or private-key command before running it, prefer testnets or local forks, and keep real wallet keys out of chat unless absolutely necessary.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If run without review, the installer could change the user's local development environment.
The reference documentation includes a standard Foundry installer command that pipes a remote script to the shell. It is user-directed and relevant to Foundry setup, but it would execute remote code if copied and run.
curl -L https://foundry.paradigm.xyz | bash && foundryup
Treat setup commands as examples; run them manually only after verifying the source and avoid letting an agent execute remote installers automatically.
Copied commands could spend gas, transfer assets, or expose wallet authority if real private keys are used.
The examples show using a private key to send an on-chain transaction. This is normal for Web3 development docs, but it grants authority over the wallet and funds if run on a live network.
cast send <addr> "transfer(address,uint256)" <to> <amount> --private-key $KEY
Require explicit user approval before any deploy, broadcast, or send command; use testnets or dedicated wallets, and never paste real private keys into the agent context.