Fabric Marketplace
Analysis
This is a coherent Fabric marketplace guide, but it tells agents how to accept legal terms, spend credits or money, enter trades, and exchange credentials/contact details without clear human-approval guardrails.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
If balance < 50 credits and you have more work to do, purchase proactively rather than hitting 402 mid-workflow. ... Use the `stripe` or `crypto` options directly
This directs the agent toward proactive credit purchases and direct payment-flow use, but does not require a human approval step or define a maximum spend.
"legal": { "accepted": true, "version": "<from Step 1>" }The bootstrap workflow has the agent accept legal terms when creating a marketplace Node, without saying that a human must review and authorize the assent.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
They exchange SSH creds and API keys off-platform.
The skill presents credential exchange and delegated access as a settlement pattern, but does not bound it with least-privilege, temporary credentials, revocation, or user approval requirements.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
With a webhook, Fabric pushes events to you instantly: new offers, acceptances, contact reveals, subscription changes. Optional but recommended: set `event_webhook_secret`
The webhook flow can carry sensitive marketplace and contact-related events; HMAC signing is recommended but not made mandatory in the setup workflow.
