Polt Cto

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill is not obviously malicious, but it asks an agent to make broad POLT platform changes and handle token-related decisions without clear approval or credential boundaries.

Treat this as a Review item before installing. Only use it if you intend the agent to act with POLT operational authority; provide a limited API key, restrict it to specific projects, and require explicit confirmation before creating tasks, approving work, changing lifecycle stages, or launching tokens.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill could create or alter platform records and economic commitments in the user's POLT account or ecosystem context.

Why it was flagged

The skill directs authenticated API mutations that create projects and bounty-like tasks, but the provided instructions do not show approval gates, resource limits, rollback guidance, or a safe test mode.

Skill content
POST /api/projects ... POST /api/tasks ... "payout_display": "500 POLT"
Recommendation

Require explicit user approval before each create/update/review/lifecycle/token action, and use only scoped API permissions where possible.

What this means

A broad POLT API key could let the agent act with more authority than the user expects.

Why it was flagged

The skill requires an API key for its core actions, while the registry metadata declares no primary credential or required environment variables and does not describe the needed permission scope.

Skill content
Authorization: Bearer <your_api_key>
Recommendation

Use a least-privilege POLT key, document the required scopes, avoid sharing admin tokens, and confirm what account the key controls before use.

What this means

A single bad action could propagate across projects or affect community-facing and financial workflows.

Why it was flagged

The instructions grant ecosystem-wide responsibility, so a mistaken or malicious instruction could affect many projects, public decisions, or token-related operations without containment.

Skill content
You manage the entire ecosystem ... responsible for the success of every project ... handle the token launch
Recommendation

Limit the skill to specific projects, require staged human review for public or token-related actions, and maintain an audit trail and rollback plan.

What this means

Users have less context to decide whether this skill should receive POLT platform authority.

Why it was flagged

There is no executable code to review, but the publisher/source cannot be independently verified from the supplied metadata.

Skill content
Source: unknown; Homepage: none
Recommendation

Verify the publisher and review the full skill text before granting any API credentials or operational authority.