Github Bounty Hunter

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill is designed to run autonomously and post bounty applications from your GitHub account, with weak scoping, under-declared credentials, and payment-related ambiguity.

Do not run this unattended as-is. Review the code, remove or replace the default wallet address, verify which GitHub account gh is using, restrict the repositories it may touch, and require manual approval before any public comment or bounty application.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

64/64 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI02: Tool Misuse and Exploitation
High
What this means

Your GitHub account could publicly apply or comment on bounty issues automatically, which may look like spam and could affect your reputation or account standing.

Why it was flagged

The script is built to decide when to apply and then post a public GitHub issue comment through the user's gh account, with no per-bounty approval, repository allowlist, or dry-run default.

Skill content
if self.should_apply(bounty): ... self.apply_to_bounty(bounty) ... ["gh", "issue", "comment", issue_number, "--repo", repo, "--body", f"/apply\n\n{proposal}"]
Recommendation

Require explicit user approval before each comment, add a dry-run mode by default, restrict allowed repositories, and set clear daily or per-run action limits.

#
ASI03: Identity and Privilege Abuse
Medium
What this means

The skill may use whatever GitHub account and token are already configured locally, without making the required account permissions or token scope clear.

Why it was flagged

The registry contract does not declare a credential, while the skill documentation requires a GitHub token and the code uses gh to act as the authenticated user.

Skill content
Primary credential: none; Required env vars: none
Recommendation

Declare GitHub authentication in metadata, document the minimum token scopes, and warn users that actions are performed under their GitHub identity.

#
ASI10: Rogue Agents
Medium
What this means

If left running, it can continue searching and attempting bounty actions beyond the user's immediate supervision.

Why it was flagged

After the user starts it, the script is designed to keep scanning on an interval indefinitely rather than performing one bounded task.

Skill content
while True: ... time.sleep(self.config["check_interval"] * 60)
Recommendation

Add a bounded run mode, maximum runtime, maximum applications per run, and clear stop instructions before enabling any automatic posting.

#
ASI09: Human-Agent Trust Exploitation
Medium
What this means

A user could mistakenly rely on a bundled wallet value when configuring bounty payments, especially because the skill markets wallet/payment handling.

Why it was flagged

A concrete default wallet address appears in a package that advertises payment tracking and wallet management, creating payment-direction ambiguity unless users notice and replace it.

Skill content
"wallet_address": "XKOe14f180561c42b1bd7b2e534b4c2e84360665da8"
Recommendation

Remove the default wallet address or replace it with an obvious placeholder, and require users to explicitly configure their own payment details.

#
ASI04: Agentic Supply Chain Vulnerabilities
Low
What this means

Setup may rely on untracked local tooling or undocumented user steps, making it harder to know exactly what will run and under which account.

Why it was flagged

The skill claims a required CLI will be auto-installed, but the provided install spec declares no install mechanism and the package metadata does not list required binaries.

Skill content
`gh` CLI (auto-installed if missing)
Recommendation

Declare required binaries in metadata and document installation clearly; avoid claiming auto-install behavior unless the reviewed artifacts implement it safely.