Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Bytesagain Crypto
v1.0.0Real-time crypto prices and 100+ technical indicators (RSI, MACD, etc.) using Binance API. 支持实时行情监控、指标计算及全网资产扫描。Pure technical reference, zero external ads.
⭐ 0· 78·0 current·0 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description advertises Binance/CoinGecko market data and technical indicators; the script queries Binance and CoinGecko and computes indicators locally. Required tools (bash, python3) are appropriate and proportional.
Instruction Scope
SKILL.md is a simple usage guide; runtime behavior (as implemented in scripts/script.sh) only fetches public API endpoints and performs local calculations. The instructions do not ask the agent to read unrelated files or secrets.
Install Mechanism
No install spec (instruction-only + a script). No downloads or extraction from untrusted URLs; the code runs locally. This is the lowest-risk install pattern.
Credentials
No required environment variables, no primary credential requested, and the code uses public REST endpoints. There are no obvious attempts to access unrelated credentials or config paths.
Persistence & Privilege
always is false and the skill does not request persistent presence or modify agent/system-wide configs. Autonomous invocation is allowed by default but is expected for normal skills.
Assessment
This skill appears to do what it says: it fetches public market data from Binance and CoinGecko and computes indicators locally using Bash+Python. Before installing, note that (1) the script will make outbound network requests to public APIs (so your agent needs internet access), (2) it executes a bundled shell script and embedded Python — review scripts/script.sh if you want to audit exact behavior, and (3) public APIs may be rate-limited. No secrets or elevated privileges are requested, so the footprint is proportionate to the described purpose.Like a lobster shell, security has layers — review code before you run it.
latestvk972w92t9ywzvrp02pvstyeebd83qmf4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
