Graph Advocate
v1.3.0Ask any blockchain question in plain English — get token balances, DeFi analytics, NFT data, prediction market odds, and protocol stats instantly. Covers 15,...
⭐ 1· 196·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the declared behavior: an instruction-only router that recommends the appropriate Graph/Token API/MCP tool for blockchain queries. It does not require unrelated binaries, credentials, or config paths.
Instruction Scope
SKILL.md instructs the agent to send the user's plain-English query to the Graph Advocate routing endpoint and then return a structured recommendation. It does not instruct local file access or to read environment variables, but it does send user query text to an external service (explicitly declared).
Install Mechanism
There is no install spec and no code files; this is instruction-only, so nothing is downloaded or written to disk as part of the skill itself.
Credentials
The skill requests no environment variables or secrets, which is proportionate given it relies on an external routing endpoint and public Graph/Token API endpoints.
Persistence & Privilege
always is false and the skill does not request persistent system privileges or modify other skills. The skill may be invoked autonomously by the agent (default behavior) but this is normal and documented.
Assessment
This skill is internally coherent, but it forwards your plain‑English query text to a third‑party endpoint (graph-advocate-production.up.railway.app). Before installing or using it: (1) do not send private keys, seed phrases, or other secrets in queries; (2) if queries include sensitive wallet addresses or proprietary data, assume the operator could see them despite the 'no storage' claim — verify the operator and GitHub repo or host your own service; (3) consider disabling autonomous invocation if you do not want the agent to send queries automatically; (4) if you need stricter privacy, use tooling that runs locally or on a trusted self-hosted endpoint.Like a lobster shell, security has layers — review code before you run it.
latestvk978sjd2gz3e3w03yjng1bpbv583ey7f
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
⛓️ Clawdis
