Autonomous Commerce

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This skill is designed to make real purchases, but it uses saved shopping/payment sessions and wallet keys while its budget, escrow, and sensitive-data safeguards are not clearly enforced.

Only use this after careful review, preferably with a dedicated Amazon account, limited payment method, and test or low-balance wallet. Require manual review of the exact final checkout total before any order is placed, pin and inspect dependencies, and delete or secure any saved checkout screenshots and proof files.

Findings (7)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If installed and run with a real Amazon session, the agent may be able to place orders using the user's saved account and payment methods.

Why it was flagged

The purchase script uses a persistent local browser profile/session, allowing it to act as a logged-in Amazon user with saved payment and address data.

Skill content
const USER_DATA_DIR = path.join(__dirname, '.chrome-session'); ... const browser = await chromium.launchPersistentContext(USER_DATA_DIR, {
Recommendation

Use only a dedicated, limited shopping profile with a restricted payment method; require explicit user confirmation at final checkout; declare this session requirement clearly in metadata.

What this means

A wallet private key can control funds; using it with this skill creates financial risk if the runtime, dependencies, or calling code are not tightly controlled.

Why it was flagged

The escrow example uses a wallet private key, but the registry requirements declare no env vars or primary credential, under-disclosing a high-impact financial credential.

Skill content
privateKey: process.env.WALLET_PRIVATE_KEY,
  network: 'base'
Recommendation

Declare required wallet credentials, use least-privilege or test wallets, avoid primary wallets, and require explicit approval for escrow creation, release, and refund actions.

What this means

Funds could be released based on incomplete or weakly verified purchase data, especially if the purchase function or order data is wrong or manipulated.

Why it was flagged

Escrow release only checks proof-hash format and presence of order fields before releasing funds; it does not recompute the proof, verify screenshot contents, check the retailer, or enforce the budget.

Skill content
if (!proofHash.startsWith('0x') || proofHash.length !== 66) { ... }
if (!orderData.orderId || !orderData.total) { ... }
await escrowClient.escrowRelease(escrowId);
Recommendation

Recompute and verify proof data, compare the final total against the escrow budget, validate retailer/order details, and require user approval before releasing escrow.

What this means

A mistake in page selection, cart contents, price parsing, or user approval flow could result in a real unintended order.

Why it was flagged

The script can click Amazon's final order button. It prompts for 'yes', but the artifacts do not show robust final total extraction, tax/shipping/cart validation, or binding to a user-provided purchase request before this action.

Skill content
const placeOrderBtn = await page.$('[name="placeYourOrder1"], input[name="placeYourOrder1"], #submitOrderButtonId input');
if (placeOrderBtn) {
  await placeOrderBtn.click();
Recommendation

Before placing an order, display the exact item, seller, quantity, shipping address, payment method, tax/shipping, and final total, then require explicit user confirmation.

What this means

Sensitive purchase and account information may remain on disk after the task and be accessible to other local processes or future users of the machine.

Why it was flagged

The script automatically stores screenshots of checkout and confirmation pages in a local temp directory; these pages may include order IDs, addresses, account details, or payment hints.

Skill content
const SCREENSHOT_DIR = '/tmp/vhagar-purchase'; ... await page.screenshot({ path: p }); ... '06-checkout.png', '07-confirmation.png'
Recommendation

Store screenshots in a user-approved secure location, redact PII before saving or sharing, and delete evidence files after verification unless the user chooses to retain them.

What this means

Users may over-trust the advertised safeguards and allow the skill to make purchases with less oversight than is warranted.

Why it was flagged

The documentation makes a strong safety claim, but the provided code does not clearly enforce a final checkout total or full escrow-budget check before order placement and escrow release.

Skill content
What agent CANNOT do: ... ❌ Purchase beyond budget
Recommendation

Tone down absolute safety claims unless enforced in code; document exactly which limits are enforced, where they are checked, and what the user must still verify.

What this means

Future dependency versions could change behavior in a sensitive commerce workflow.

Why it was flagged

The skill depends on external npm packages with semver ranges. These dependencies are purpose-aligned, but they matter more because the skill handles purchases and wallet-backed escrow.

Skill content
"dependencies": {
    "playwright": "^1.40.0"
  },
  "optionalDependencies": {
    "clawpay": "^1.0.0"
  }
Recommendation

Pin dependency versions, use a lockfile, and review dependencies before running the skill with real accounts or funds.