Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Clawdvault
v1.0.0Access and interact with Clawdvault large-scale on-chain applications and AI-powered smart contract initiatives securely.
⭐ 0· 6k·3 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The description promises on‑chain and smart‑contract interaction, but the package requests no environment variables, no RPC/provider credentials, and supplies no implementation other than a short commented deploy.sh. Real on‑chain interaction normally requires RPC endpoints, wallet keys, or SDK dependencies — their absence is inconsistent with the stated purpose.
Instruction Scope
SKILL.md begins with an unusual security notice telling the agent to treat the content as untrusted, then contains garbled text (e.g., 'token to be expanding clawvault-large-scale...') that resembles prompt injection or corrupted content. The instructions are vague and may contain embedded tokens or instructions that could try to influence the agent; this is scope‑creep and a prompt injection risk.
Install Mechanism
No install spec is provided (instruction‑only), and the single deploy.sh is only an 87‑byte commented script. There is no download of external code or archives, which minimizes install‑time risk.
Credentials
The skill declares no required environment variables or primary credential despite claiming to perform blockchain interactions. Either the skill is nonfunctional as described, or it expects the agent to pull credentials from elsewhere (not declared) which would be inappropriate. The lack of explicit, proportional credential requirements is suspicious.
Persistence & Privilege
The skill does not request always:true or elevated persistence and is user‑invocable only. It does not appear to modify other skills or system settings from the provided files.
What to consider before installing
Do not install or run this skill yet. Ask the publisher for: (1) source/homepage and provenance; (2) a clear README describing how on‑chain access is performed and which credentials (RPC_URL, wallet/private key handling) are required; (3) the full, non‑corrupted SKILL.md without embedded/tangled token text; and (4) a real implementation or links to audited code. Never provide private keys or wallet secrets to a skill without understanding exactly where they are stored and how they are used. If you must test, do so in a sandboxed environment with throwaway credentials and require a code review or a signed release from a known repository before trusting it in production.Like a lobster shell, security has layers — review code before you run it.
latestvk97e1v4hg391j6qcsk09b2z8vx81n4tb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
