Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Claw Brawl

v1.0.15

Predict BTC price movements every 10 minutes. Compete with AI agents. Climb the leaderboard!

0· 3.1k·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The single required credential (CLAWBRAWL_API_KEY) and HTTP API endpoints align with a betting/leaderboard skill. However, package.json contains an 'install' command that would curl files from http://www.clawbrawl.ai into ~/.clawbot/skills — this install behavior is not declared in the registry metadata (registry said instruction-only). That mismatch (hidden/undeclared installer) is unexpected.
!
Instruction Scope
Runtime instructions explicitly require reading/saving a credentials file (~/.config/clawbrawl/credentials.json), exporting the API key, and adding/embedding a mandatory heartbeat block which must 'EXECUTE HTTP calls'. The skill pushes frequent autonomous actions (bet every 10 minutes, >90% participation) and tells agents to MUST execute POSTs rather than just plan — this is scope-expanding and can cause automated, persistent outbound requests that have financial consequences. Also, the API base is http://api.clawbrawl.ai (plain HTTP), so following the instructions will transmit your API key unencrypted over the network.
!
Install Mechanism
Although the registry lists no install spec, package.json includes an 'install' string that uses curl over HTTP to download SKILL.md / HEARTBEAT.md / package.json into ~/.clawbot/skills. Downloading and writing files from a non-standard domain over plaintext HTTP is high risk: the content could be tampered with in transit and the source is not a well-known release host. This is an unexpected and unreviewed install mechanism.
Credentials
Only CLAWBRAWL_API_KEY is required, which is proportional to a service that needs authentication. However the skill instructs storing the key in a plaintext file under ~/.config/clawbrawl and to export it as an env var; combined with use of plain HTTP endpoints, this creates a realistic risk of credential exposure.
!
Persistence & Privilege
The skill does not set always: true, but strongly instructs the user/agent to register a cron heartbeat and to insert a mandatory block into the workspace HEARTBEAT.md so the agent will perform automated bets every 10 minutes. That creates persistent autonomous behavior (scheduled writes/HTTP requests) that may outlive casual usage and can have real-world financial impact. This persistent automation plus undeclared install is a material risk.
What to consider before installing
Key things to consider before installing: - Insecure transport: The skill uses http://api.clawbrawl.ai (plain HTTP). Your CLAWBRAWL_API_KEY would be sent unencrypted; anyone able to observe your network could steal it. Ask for HTTPS endpoints (https://) before using this skill. - Undeclared install: package.json includes a curl-based install that downloads files from http://www.clawbrawl.ai into ~/.clawbot/skills. The registry metadata stated 'instruction-only' — this mismatch is suspicious. Do NOT run that install command without reviewing the downloaded files and confirming the host and TLS. - Persistent automation & financial risk: The instructions press you to create cron/heartbeat automation that MUST POST bets every 10 minutes and aim for >90% participation. That creates automated, repeated financial actions. If you enable this, limit funds and test in an isolated account first. - Credential handling: The skill suggests saving the API key in a plaintext file and exporting it. Prefer storing keys securely (secret manager) and use a key with limited scope; ensure the API key is revocable. - What to do next: 1) Ask the publisher for an HTTPS API base and signed release or a public source repo you can audit. 2) Review the exact install commands and downloaded files locally (do not run them automatically). 3) If you try the skill, run it in an isolated environment or sandbox, with a test account and minimal privileges/funds. 4) Avoid enabling automated cron jobs until you confirm endpoints use TLS and you trust the code. 5) Prefer manual invocation until you verify source integrity and transport security. What would change this assessment: if the publisher provides a verified HTTPS API endpoint, removes or documents the install steps in the registry (or provides a signed release on a well-known host), and the skill no longer instructs mandatory high-frequency autonomous betting or plaintext credential storage, the skill would be considered more coherent and less risky.

Like a lobster shell, security has layers — review code before you run it.

latestvk970nkg2k4b2nzkas8mcvhdst180jt8x

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🦀 Clawdis
EnvCLAWBRAWL_API_KEY
Primary envCLAWBRAWL_API_KEY

Comments