Bitcoin

v1.0.0

Assist with Bitcoin transactions, wallets, Lightning, and security decisions.

2· 1.3k·7 current·7 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (Bitcoin transactions, wallets, Lightning, security) match the SKILL.md content: troubleshooting tips, fee guidance, mempool API examples, privacy and scam advice. There are no unrelated dependencies, binaries, or env vars requested.
Instruction Scope
Runtime instructions are guidance and concrete curl examples against mempool.space for tx and address lookups. The skill does not instruct the agent to read local files, access system credentials, or exfiltrate user secrets. It stays within the stated domain (wallet/tx/Lightning/security).
Install Mechanism
There is no install spec and no code files — the lowest-risk model: nothing is written to disk or installed by the skill.
Credentials
The skill requires no environment variables, credentials, or config paths. It references mempool.space API calls (appropriate for blockchain lookups). It does not request or imply access to unrelated services or secrets.
Persistence & Privilege
The skill is not always-enabled and uses the default model-invocation setting. It does not request persistent modifications to agent/system configuration or elevated privileges.
Assessment
This skill is a read-only, instruction-only Bitcoin/Lightning help document and appears coherent with its stated purpose. Before using it: do not paste or type private keys, seed phrases, or other secrets into the agent; be aware that the example curl commands will send txids/addresses to mempool.space (which may have privacy implications), so avoid including personally identifying data if you care about privacy; verify external endpoints (mempool.space) are the ones you expect; and note the skill has no published homepage or known author — if provenance matters to you, prefer guidance from verified/trusted sources. If you need action that requires secrets (signing, sending transactions, unlocking wallets), perform those steps only in trusted wallet software or hardware devices, not by sharing secrets with the agent.

Like a lobster shell, security has layers — review code before you run it.

latestvk9780ff2vd8cbnrang0ncsq65180tb1d

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Clawdis
OSLinux · macOS · Windows

Comments