Didit Aml Screening
Analysis
This skill appears to perform the Didit AML screening it claims, but it uses your Didit API key and may send and store sensitive identity details with Didit.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
api_key = os.environ.get("DIDIT_API_KEY") ... headers={"x-api-key": api_key, "Content-Type": "application/json"}The helper authenticates to Didit with the user's API key. This is expected for an AML API integration, but the key may authorize account usage or billable requests.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`document_number` ... ID document number ("Golden Key") ... `save_api_request` | boolean | No | `true` | Save in Business ConsoleThe documented request can include sensitive identity data, and the provider-side API request saving is described as enabled by default.
