Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Carbium — Solana DeFi Infrastructure

v1.0.2

Build on Solana with Carbium infrastructure — bare-metal RPC, Standard WebSocket pubsub, gRPC Full Block streaming (~22ms), DEX aggregation via CQ1 engine (s...

3· 397·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoRequires walletCan make purchasesCan sign transactions
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill claims to be a Solana infrastructure integration and all code and docs reference Carbium endpoints and two API keys (CARBIUM_RPC_KEY and CARBIUM_API_KEY). However, the registry metadata lists no required environment variables or primary credential. That mismatch (declared no creds vs. runtime instructions and template code that demand two keys) is inconsistent and unexpected.
Instruction Scope
The SKILL.md and included examples stay within the stated purpose (RPC, WebSocket, gRPC, Swap API). They include examples for signing/submitting transactions, MEV-protected bundles, gasless swaps, and an explicit 'pump.fun snipe' bot. Those examples are legitimate uses of an RPC/swap provider but are high-risk (e.g., skipping preflight, program-level bonding-curve sniping) and provide code that will accept user secret keys. The instructions do not direct data to third-party endpoints outside Carbium's domains.
Install Mechanism
This is an instruction-only skill with no install spec and no remote downloads. The only shipped code is example/template source; nothing in the package performs network fetches at install time. This is the lower-risk install profile.
!
Credentials
The runtime examples and templates require CARBIUM_RPC_KEY and CARBIUM_API_KEY (and developer code assumes environment secrets and may throw if they are missing), but the skill metadata declares no required env vars or primary credential. The keys requested are reasonable for the described functionality, but the metadata omission is a red flag: callers may not be warned that secret keys are needed, and the template code expects secrets in process.env. Examples also show usage of private key material (Keypair.fromSecretKey) which is legitimate but increases sensitivity — the skill does not attempt to exfiltrate them, but the docs encourage risky operations that require careful key handling.
Persistence & Privilege
The skill does not request persistent/always-on privileges, does not include an install hook, and does not modify other skill or system configurations. Autonomous invocation is allowed by platform default but is not combined with other elevated privileges here.
What to consider before installing
This package looks like documentation and example code for a Solana RPC/Swap provider called 'Carbium' and mostly behaves as expected — but the registry metadata failing to declare required environment variables (CARBIUM_RPC_KEY and CARBIUM_API_KEY) is inconsistent and reduces trust. Before installing or using it: 1) Verify the skill's origin (homepage is missing and owner ID is unknown); prefer packages that list required envs and a homepage/repository. 2) Treat CARBIUM_RPC_KEY and CARBIUM_API_KEY as secrets: create separate keys for dev/staging/prod, restrict them by IP/domain in the provider dashboard, and rotate if exposed. 3) Be cautious with the provided trading/sniping examples: they require signing keys and use options like skipPreflight/skip checks and high-frequency actions; run them only in isolated, audited environments and never put signing keys into untrusted or client-side code. 4) If you need higher assurance, ask the publisher to update the registry metadata to declare the required env vars and a homepage/repo and to clarify any telemetry or logging behavior; absence of that information keeps confidence from being high.
templates/carbium-setup.ts:16
Environment variable access combined with network send.
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

defivk97ctdpphh2ypnw3hmanfwgy5x81syx2grpcvk97ctdpphh2ypnw3hmanfwgy5x81syx2latestvk97bc8jxvjwpr73ds9mmgcyx6984nznhrpcvk97ctdpphh2ypnw3hmanfwgy5x81syx2solanavk97ctdpphh2ypnw3hmanfwgy5x81syx2tradingvk97ctdpphh2ypnw3hmanfwgy5x81syx2web3vk97ctdpphh2ypnw3hmanfwgy5x81syx2

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments