Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Cannon

Cannon package manager for Ethereum deployments. Use when building, testing, deploying, or inspecting Cannon packages. Covers cannonfile syntax, CLI commands...

MIT-0 · Free to use, modify, and redistribute. No attribution required.
1 · 145 · 0 current installs · 0 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The SKILL.md content describes a Cannon package-manager helper for building, testing and publishing Ethereum packages — that purpose matches the name/description. However the manifest declares no required env vars/binaries while the instructions clearly require Node/pnpm, Foundry, the Cannon CLI and often sensitive values (CANNON_PRIVATE_KEY, RPC URLs, Etherscan API keys). The capability itself is expected for this purpose, but the manifest omits those real requirements.
Instruction Scope
The SKILL.md is instruction-only and stays on-topic (CLI usage, cannonfile syntax, workflows, safety warnings). It explicitly instructs the operator/agent to run commands that can perform irreversible on-chain actions, to use private keys or impersonation, to read/write Cannon state directories, and to request RPC endpoints via stdin if not provided. Those instructions are within scope for a deployment skill but they involve handling secrets, filesystem state (~/.local/share/cannon) and network endpoints.
Install Mechanism
No install spec and no code files are executed by the skill itself — this is an instruction-only skill (low installer risk). The README/package.json point to upstream Cannon but the skill does not download or install code as part of the skill package.
!
Credentials
The manifest lists no required environment variables, but the SKILL.md references several sensitive variables (CANNON_PRIVATE_KEY, CANNON_DIRECTORY) and common deployment inputs (RPC_URL, Etherscan API key). Those secrets are proportionate to deployment/publishing functionality, but the manifest should declare them so users know what will be needed and why. The mismatch is a transparency issue and increases risk if an agent is granted autonomous access without the user realizing these secrets are relevant.
Persistence & Privilege
The skill is not always-enabled, has no install scripts, and does not request persistent platform privileges. It does reference and write to Cannon's own cache directory (~/.local/share/cannon/) when used, which is expected for the tool's function.
What to consider before installing
This skill is an instruction-only Cannon CLI/usage reference and appears to be what it says, but pay attention to two things before enabling it: 1) The SKILL.md expects you to use private keys, RPC endpoints, and API keys (CANNON_PRIVATE_KEY, RPC_URL, Etherscan key). The skill manifest does not declare those env vars — that’s a transparency gap. Do not give any agent your real private key or unrestricted RPC credentials. Use --dry-run and local chain 13370 or impersonation for testing, or supply ephemeral/test keys. 2) Verify the source before trusting publish/register instructions: the skill's Homepage is missing and Owner ID is opaque. If you plan to allow autonomous invocation, consider disabling autonomous actions for this skill or only enable it for read/analysis tasks; require explicit human confirmation before any deploy/publish commands. If you need to use the skill for deployments, prefer running the Cannon CLI yourself on a machine you control and keep secrets out of the agent environment.

Like a lobster shell, security has layers — review code before you run it.

Current versionv2.26.0
Download zip
latestvk9730vt4vdwjdavnqjqabszt3582ksvj

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

Cannon

⚠️ CRITICAL: Read This First

Some Cannon commands are IRREVERSIBLE and handle real value. Be careful with:

  • cannon build (without --dry-run) — deploys contracts on real networks
  • cannon publish — publishes to on-chain registry (permanent)
  • cannon register — registers package names on-chain
  • cannon publishers — manages package publisher permissions

Safe commands: cannon build --dry-run, cannon inspect, cannon run, cannon test, cannon decode, cannon trace, cannon clean

Rules:

  1. Always use --dry-run first — Simulate before executing on real networks
  2. Make every operation clear to the user — Explain what will happen before running
  3. Confirm before deploying — Never use a real private key without explicit approval
  4. Test locally first — Use chain 13370 (Cannon Network) before target chains
  5. Protect private keys — Use CANNON_PRIVATE_KEY env var or --impersonate (recommended)

Model Recommendation

Use state-of-the-art models for Cannon tasks. Deployment scripts handle real value — don't skimp on model quality. Prefer Claude, GPT-4, or equivalent high-capability models over cheaper alternatives.

Schema Reference

For complete cannonfile syntax validation and autocomplete, refer to the official JSON schemas:

For editor validation, add the schema reference at the top of your cannonfile.toml:

#:schema https://raw.githubusercontent.com/usecannon/cannon/refs/heads/dev/packages/lsp/src/schema.json

name = "my-package"
version = "1.0.0"
...

This enables autocomplete and validation in editors with TOML LSP support (like taplo).


Cannon is a package manager and deployment system for Ethereum smart contracts. It uses declarative cannonfiles to define deployment workflows and supports both local development and on-chain deployments.

Prerequisites

Before using this skill, ensure these tools are installed:

  • Node.js 18+ and pnpm - npm install -g pnpm
  • Foundry (forge, anvil, cast) - curl -L https://foundry.paradigm.xyz | bash && foundryup
  • Cannon CLI - pnpm add -g @usecannon/cli

Verify installation:

node --version && pnpm --version
forge --version && anvil --version
cannon --version

Quick Reference

For complete CLI options, see references/cli.md.

CLI Commands

cannon build              # Build package locally (starts anvil, deploys contracts)
cannon run <pkg:ver>      # Run a deployed package (shorthand: cannon <pkg:ver>)
cannon test               # Run forge tests with deployment context
cannon inspect <pkg:ver>  # View package details
cannon publish            # Publish to on-chain registry + IPFS ⚠️ IRREVERSIBLE
cannon clean              # Delete cache directories
cannon verify             # Verify contracts on Etherscan/Sourcify

Package Reference Format

<package-name>:<version>@<preset>

Examples:

  • greeter-foundry:2.24.0
  • safe:1.4.1
  • synthetix-omnibus:3.1.4@main

Cannonfile Syntax

Package Metadata & Includes

name = "my-package"
version = "1.0.0"
description = "My package description"
tags = ["defi", "token"]
preset = "main"

# Include additional files containing actions (for larger packages)
include = ["./deposits.toml", "./withdrawals.toml"]

Use include to split large cannonfiles into multiple files. Included files use the fragment schema and can contain any actions (deploy, invoke, clone, etc.).

Modern syntax uses [var.label] for settings (deprecated: [setting.name]).

Variables

[var.chainId]
defaultValue = 1

[var.owner]
defaultValue = "0x..."

Deploy Contract

[deploy.MyContract]
artifact = "MyContract"
args = ["<%= settings.owner %>"]

Invoke Function

[invoke.initialize]
target = ["<%= contracts.MyContract.address %>"]
func = "initialize"
args = ["<%= settings.owner %>"]

Import/Clone Package

[clone.safe]
source = "safe:1.4.1"
target = "safe"

When to use clone vs import:

  • clone — Use another package as a "blueprint" to deploy it anew. Always set target appropriately (same as source if you own it, or a new name if not).
  • import — Pull in data from an already-deployed package without re-deploying.

Pull Data from Package

[pull.usdc]
source = "usdc:1.0.0@main"

Access: <%= imports.usdc.contracts.USDC.address %>

Template Strings

Use ERB-style templates to reference values:

  • <%= settings.varName %> — settings
  • <%= contracts.ContractName.address %> — deployed contract address
  • <%= contracts.ContractName.abi %> — contract ABI
  • <%= imports.pkg.contracts.Contract.address %> — imported contract

Actions

ActionDescription
deployDeploy a contract
invokeCall a contract function
cloneDeploy another package as a blueprint
importPull data from an already-deployed package
pull(deprecated) Alias for import
varDefine computed variables
routerCreate a router contract to bypass size limits (pairs well with UUPS proxy)
diamondCreate an EIP-2535 Diamond with facets

Local Development

⚠️ Always use chain 13370 (Cannon Network) for local testing before deploying to target chains.

Default chain ID: 13370 (Cannon Network)

# Build with local anvil
cannon build

# Build for specific chain
cannon build --chain-id 1 --rpc-url $RPC_URL

# Dry run (simulation only)
cannon build --dry-run --impersonate-all

# Run a package locally
cannon run greeter-foundry:2.24.0

On-Chain Deployment

⚠️ Always use --dry-run first to verify deployments before executing on real networks.

# Deploy to mainnet
cannon build --chain-id 1 --rpc-url $RPC_URL --private-key $KEY

# Publish to registry
cannon publish --chain-id 1 --rpc-url $RPC_URL --private-key $KEY

# For simulation before actual deploy
cannon build --chain-id 1 --rpc-url $RPC_URL --dry-run

Testing

# Run tests with forge
cannon test

# Test specific contract
cannon test --match-path "test/MyContract.t.sol"

Use cannon-std in Forge tests:

import {Cannon} from "cannon-std/Test.sol";

contract MyTest is Cannon {
    function setUp() public {
        // Load deployed contracts
        address myContract = getAddress("MyContract");
    }
}

Storage Locations

DirectoryContents
~/.local/share/cannon/tags/Package reference files
~/.local/share/cannon/ipfs_cache/Cached IPFS artifacts
~/.local/share/cannon/build_results/Build outputs
~/.local/share/cannon/blobs/Large binary blobs

Common Patterns

Router Pattern (Bypass Contract Size Limits)

Create a router contract that efficiently passes calls to downstream contracts. Powerful when combined with a UUPS proxy.

[deploy.CoreImplementation]
artifact = "Core"

[deploy.AnotherImplementation]
artifact = "Another"

[router.CoreRouter]
dependencies = ["CoreImplementation", "AnotherImplementation"]

Diamond Pattern (EIP-2535)

[deploy.Diamond]
artifact = "Diamond"

[deploy.FacetA]
artifact = "FacetA"

[deploy.FacetB]
artifact = "FacetB"

[diamond.Diamond]
facets = ["FacetA", "FacetB"]

Linked Libraries

[deploy.Library]
artifact = "Library"

[deploy.Contract]
artifact = "Contract"
libraries = { Library = "<%= contracts.Library.address %>" }

Debugging Tools

Cannon provides commands to decode bytecode, trace transactions, and interact with deployed contracts.

Decode

Decode hex data (function calls, events, errors) using package ABIs:

cannon decode synthetix-omnibus --chain-id 8453 --preset main 0x...

Trace

Get human-readable stack traces for transactions:

cannon trace <tx-hash> --chain-id 1 --rpc-url $RPC_URL

Interact

Send transactions to deployed contracts through the CLI:

cannon interact synthetix-omnibus --chain-id 8453 --contract CoreProxy

Package State Manipulation (alter)

The alter command modifies existing Cannon packages outside the regular build process. Use for troubleshooting, migrations, or fixing broken package state.

⚠️ Only use alter when no other option exists.

Subcommands

CommandDescription
importImport existing artifacts into a deployment step (for migrations)
set-contract-addressChange a contract's address in the deployment
mark-completeMark a deployment step as complete
mark-incompleteMark a deployment step as incomplete
set-urlUpdate the deployment URL reference
set-miscUpdate miscellaneous data URL
clean-unusedRemove unused deployment states
migrate-212Migrate packages from version 2.12 format

Example: Import existing deployment

# Import a deployed contract by its creation transaction
cannon alter my-package:1.0.0 --chain-id 1 import deploy MyContract 0x...txhash

# Import an executed transaction
cannon alter my-package:1.0.0 --chain-id 1 import invoke initialize 0x...txhash

GitOps Workflows

Cannon supports GitOps-style deployments through the website interface.

Queue with GitOps

Deploy packages directly from GitHub repositories or IPFS hashes via the Cannon website:

  • Preview transactions before execution
  • View Git Diff of changes
  • Execute through Safe multisig wallets
  • Publish to registry after deployment

See: https://usecannon.com/deploy

Deployments Repository

Create a dedicated Git repository for deployment configurations (separate from source code):

  • Keep smart contract source private while maintaining transparent deployments
  • Enable team collaboration on deployments
  • Maintain clear audit trail

Migration from Other Tools

Migrating from hardhat-deploy, Foundry scripts, or other deployment frameworks:

  1. Recreate deployment as cannonfile.toml (manual but usually quick)
  2. Build locally to create template: cannon build (save the IPFS hash)
  3. For each network, import existing deployments:
    # Set the package URL to local template
    cannon alter my-package --chain-id 1 set-url <ipfs-hash>
    
    # Import each deployed contract/transaction
    cannon alter my-package --chain-id 1 import deploy MyContract 0x...txhash
    
  4. Verify by running build (no steps should execute): cannon build --chain-id 1

Advanced Topics

For detailed information on:

Troubleshooting

IssueSolution
"deployment not found"Package not published for this chain ID. Check --chain-id
Build fails with "artifact not found"Run forge build first, or check artifact path
IPFS timeoutCheck network connection, may need IPFS gateway
Registry publish failsVerify you have write permissions for the package name
Wrong chain deployedAlways double-check --chain-id — deployments cannot be undone
Published incorrect packageRegistry publishes are permanent — verify version and artifacts first

Development Workflow

  1. Develop contracts with Foundry
  2. Write cannonfile.toml to define deployment
  3. Build locally with cannon build (chain 13370)
  4. Test with cannon test
  5. Simulate with --dry-run for target chain ⚠️ ALWAYS DO THIS FIRST
  6. Deploy with cannon build --chain-id <id> ⚠️ IRREVERSIBLE on non-local networks (safe on chain 13370)
  7. Verify contracts on Etherscan with cannon verify
  8. Publish with cannon publish ⚠️ PERMANENT ON-CHAIN

Key Files

FilePurpose
cannonfile.tomlPackage definition
cannonfile.lockLocked dependencies
.cannon/Build cache (gitignored)
deployments/Deployment artifacts

Files

7 total
Select a file
Select a file to preview.

Comments

Loading comments…