Giza

WarnAudited by ClawScan on May 18, 2026.

Overview

This skill appears aligned with DeFi yield management, but it can affect real funds and does not clearly require explicit confirmation for every financial change.

Use this only if you trust Giza and understand the risks of DeFi yield products. Before any account change, ask the agent to restate the exact network, asset, amount, protocol, fees, risks, and reversibility, and give explicit approval only when you are satisfied.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user could ask for a broad strategy change and the agent may be instructed to call a financial tool that changes where funds are allocated without first restating the exact change, risks, fees, and asking for a clear yes.

Why it was flagged

The skill documents explicit confirmation for withdrawals and deactivation, but also routes strategy/protocol changes to a mutating Giza tool without a visible equivalent confirmation requirement in the provided artifact.

Skill content
"For these actions, always get explicit confirmation before executing: ... Withdrawals ... Deactivation" and "Change protocols" / "Switch strategies" | giza_update_protocols
Recommendation

Require explicit user confirmation for every fund-affecting action, including protocol updates, onboarding/deposit setup, top-ups, rebalancing, and withdrawals; show network, asset, amount, protocols, fees, and risks before execution.

What this means

After login, the connected service may be able to view portfolio information and perform account operations supported by the Giza tools.

Why it was flagged

The skill requires a Giza login flow to access account-specific DeFi operations. This is expected for the purpose, but it grants the integration privileged access to portfolio and transaction functions.

Skill content
"If any tool call returns an authentication error: 1. Call giza_login to get a login URL ... Retry the original operation after confirmation"
Recommendation

Only log in if you trust the Giza service, verify the login URL, and avoid approving actions unless the agent has clearly summarized what will happen.

What this means

Portfolio details and financial action requests may be sent through the Giza MCP server.

Why it was flagged

The skill depends on an external MCP server for financial account data and actions. This is purpose-aligned, but the provided artifact does not describe the server endpoint, permission boundaries, or data-handling guarantees.

Skill content
"Connects to the Giza MCP server for autonomous stablecoin yield across Base, Arbitrum, Plasma, and HyperEVM."
Recommendation

Verify the MCP server source and permissions before use, and keep financial actions user-directed with explicit approvals.

What this means

Users have less information for confirming who publishes or operates the financial integration behind the skill.

Why it was flagged

There is no runnable code to inspect and no install source or homepage in the supplied metadata. For a DeFi skill that references an MCP server, this limits provenance verification.

Skill content
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.
Recommendation

Install only from a trusted registry entry, verify Giza’s official documentation separately, and confirm that the MCP tools come from the expected provider.