Back to skill
Skillv1.0.1
ClawScan security
Create a coin on trends.fun · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignFeb 23, 2026, 3:40 AM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill’s code, install steps, and runtime instructions are internally consistent with its stated purpose (creating a trends.fun coin and deploying a Meteora DBC pool); it requires the user’s Solana keypair to sign transactions and authenticate, which is expected for this functionality and is the primary sensitive action to be aware of.
- Guidance
- This tool legitimately needs access to your Solana keypair (~/.config/solana/id.json) so it can sign a login message and send transactions to create the token/pool. That is the main sensitive action — the code signs with your key but does not upload the secret key to remote servers. Before installing/running: (1) Review and trust the code or run it in an isolated environment; (2) never paste or send your private key to anyone — the docs’ wording about “outputting the keypair” is ambiguous and could be dangerous; (3) ensure you understand and accept the real SOL costs (transactions will spend SOL); (4) if you are unsure, create and use a throwaway/test Solana wallet with minimal funds for initial tests.
Review Dimensions
- Purpose & Capability
- okThe name/description match the implementation: the code talks to trends.fun APIs (siws/verify, upload_url, mint/upload_content), uploads an image to IPFS, mints a token and uses @meteora-ag/dynamic-bonding-curve-sdk to create a DBC pool. Declared binaries (pnpm) and optional env vars (SOLANA_RPC_URL, TRENDS_POOL_CONFIG) are appropriate for the stated purpose.
- Instruction Scope
- noteThe SKILL.md and code explicitly read the user’s Solana keypair at ~/.config/solana/id.json, check SOL balance, sign SIWS messages and Solana transactions, upload images to trends.fun/Pinata, then create a DBC pool. These actions are expected for this workflow but are sensitive: the skill will use your private key to sign requests and transactions. Also note the SKILL.md text that suggests generating a keypair “并将keypair和地址输出给用户” — wording could be interpreted as encouraging exposing the private key; the code itself does not transmit the secret key, but the documentation phrasing is risky and should be clarified.
- Install Mechanism
- okInstall is a single, standard brew formula (pnpm). The package manifests (package.json/pnpm-lock/package-lock) point to public npm packages. No downloads from arbitrary URLs or extract-from-unknown-host steps are present in the install spec.
- Credentials
- okNo required credentials are declared; optional env vars (SOLANA_RPC_URL, TRENDS_POOL_CONFIG) are relevant. The code reads HOME to find ~/.config/solana/id.json (expected). No unrelated secrets or config paths are requested.
- Persistence & Privilege
- okThe skill does not request always:true, does not modify other skills, nor asks for permanent system-wide changes. It runs ad-hoc and signs on behalf of the keypair provided at runtime.
