Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
CoinGecko
v1.0.0Fetch real-time crypto prices, market caps, 24h changes, trending coins, and token details from CoinGecko's free API for thousands of cryptocurrencies.
⭐ 1· 1.3k·8 current·8 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description claim realtime crypto data from CoinGecko and the included Python scripts implement exactly that (price, search, token-by-contract, trending). No unrelated env vars, binaries, or APIs are required.
Instruction Scope
SKILL.md instructs running the provided scripts. The scripts only perform HTTPS requests to api.coingecko.com, parse responses, and print JSON. They do not read local files, access environment variables, or transmit data to other endpoints.
Install Mechanism
No install spec (instruction-only skill with code files). There is no downloading of external archives or package installation; the scripts run with the system Python and make outbound HTTPS requests.
Credentials
The skill declares no required credentials or config paths and the code does not attempt to read environment variables or other secret-bearing locations. Network access to CoinGecko is the only runtime requirement.
Persistence & Privilege
always:false and no attempt to modify other skills or system configs. Agent autonomous invocation is allowed (platform default) but the skill does not request elevated or persistent privileges.
Assessment
This skill is coherent and implements a straightforward CoinGecko client. Before installing, note that it will make outbound HTTPS requests to api.coingecko.com (CoinGecko's free API) and is subject to their rate limits (~30 req/min). The source is 'unknown'—if you require a vetted origin, verify the publisher or inspect/track future updates; otherwise the code shown appears benign and limited in scope.Like a lobster shell, security has layers — review code before you run it.
latestvk978vvdzdmydda9wxb9tz7ybe1812b6z
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
