Binance Square Skill

WarnAudited by ClawScan on May 18, 2026.

Overview

The skill is coherent for Binance Square posting, but it relies on full Binance session cookies and includes helper code that can persist or use those credentials in risky ways.

Only install or run this skill if you are comfortable giving the agent a live Binance session. Prefer a dedicated account, require explicit approval before each post, do not run the endpoint probe on a real account, and inspect/delete any generated API analysis files that may contain cookies or tokens.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent with these values may act as the logged-in Binance user for the supported Binance endpoints, and the credential is broader than a scoped posting-only token.

Why it was flagged

The skill requires the user's full Binance browser cookie header and CSRF token, which are active account session credentials used for authenticated publishing.

Skill content
`BINANCE_COOKIE_HEADER` | 浏览器请求的完整 `cookie` header 值 ... `BINANCE_CSRF_TOKEN` | `csrftoken` cookie 的值
Recommendation

Use only with a dedicated or low-risk account, keep the env isolated, rotate/logout the session after use, and require explicit approval before publishing.

What this means

Users may underestimate the sensitivity of the skill before installation because the registry contract does not surface the required Binance session credentials.

Why it was flagged

Registry metadata says no env vars or primary credential are required, while the skill documentation requires Binance cookie and CSRF session values.

Skill content
Required env vars: none ... Primary credential: none
Recommendation

Fix the registry metadata to declare Node and the Binance cookie/CSRF credentials clearly before users install or invoke the skill.

What this means

Sensitive Binance session material could be saved under the project directory and later exposed through logs, sharing, or accidental git commits.

Why it was flagged

The analyzer captures request headers and writes them into a persistent JSON report; authenticated Binance requests may include cookies, CSRF tokens, or session-like headers.

Skill content
const headers = request.headers(); ... capturedRequests: requests ... writeFileSync(outputPath, JSON.stringify(report, null, 2), "utf8");
Recommendation

Do not run the analyzer with real sessions unless necessary; redact Cookie/CSRF/session headers, add generated reports to .gitignore, and delete any generated analysis files.

What this means

If run against a logged-in Binance browser, this helper could create, publish, or draft test content on the user's account unexpectedly.

Why it was flagged

The probe helper uses the live browser session to POST to private content creation/publish/draft endpoints with test content, without an evident dry-run or confirmation gate.

Skill content
credentials: "include" ... ["POST", "/bapi/composite/v1/private/pgc/content/publish", { content: "test" }]
Recommendation

Avoid running probe-endpoints.ts on a real account; add explicit confirmation, dry-run mode, and safeguards before any mutating endpoint probes.

What this means

A misconfigured or untrusted CDP endpoint could expose or misuse the Binance session through browser-control access.

Why it was flagged

The optional CDP path connects to a browser debugging endpoint and injects Binance cookies into that browser context.

Skill content
const pages = await fetchCdpPages(this.config.cdpUrl); ... await injectCookies(send, this.config.cookieHeader);
Recommendation

Use CDP only with a trusted local browser endpoint, do not expose the debugging port publicly, and close the browser debugging session after use.