Web3 Target Team Research

PassAudited by VirusTotal on May 12, 2026.

Findings (1)

The skill is classified as suspicious due to its aggressive use of agent capabilities and potentially problematic file access instructions. It explicitly sets up a cron job and modifies HEARTBEAT.md for continuous, 24/7 auto-respawning of subagents, which is a form of persistence. It also instructs the agent to use a 'screenshot' capability for Telegram profile verification, a high-risk action. Furthermore, the `references/workflow.md` file contains hardcoded absolute paths (`/Users/derrick/clawd/crypto-master.csv`) for reading and writing data, which, while targeting the skill's own data files, could lead to unintended behavior or write attempts outside the designated workspace if the agent's environment differs from the hardcoded path.