Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Monad Development

v1.0.0

Builds dapps on Monad blockchain. Use when deploying contracts, setting up frontends with viem/wagmi, or verifying contracts on Monad testnet or mainnet.

2· 1.9k·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The stated purpose (building/deploying/ verifying Monad smart contracts and frontends) aligns with the content: Foundry, forge, viem/wagmi, RPCs, and verification are expected for this task. However the skill relies on a third-party proxy (agents.devnads.com) for faucet and verification calls instead of only using official endpoints, which is not strictly necessary for the claimed purpose and is notable.
!
Instruction Scope
The runtime instructions tell the agent to create and persist wallets (including private keys) and write them to files (~/.monad-wallet or .env) and to always verify via a remote verification API. They also explicitly instruct 'Do NOT use a browser. Use these APIs directly with curl.' Persisting private keys and pushing build/standard-json/metadata to a third-party API expands scope beyond normal compile/deploy actions and could lead to secret or source-code disclosure.
Install Mechanism
No install spec and no code files — the skill is instruction-only. This is low risk in the sense that nothing is downloaded or written by an installer, but runtime instructions will cause network I/O and file writes.
!
Credentials
The skill does not declare required env vars but references $PRIVATE_KEY in examples and mandates persisting generated private keys. A deployment skill legitimately needs a private key, but the instructions require storing it persistently without declaring or justifying secure handling by the agent. The use of an external verification/faucet proxy increases the attack surface for exfiltrated values (source, metadata, potentially constructor args).
!
Persistence & Privilege
The skill's metadata does not request 'always' or system-level privileges, but the instructions explicitly demand that agents 'MUST persist' generated wallets and suggest writing secret material to disk. That is a high-risk runtime instruction: it asks the agent to create long-lived sensitive artifacts in the environment that could be accessible later or captured by the verification/faucet proxy.
What to consider before installing
This skill largely describes normal Monad development steps, but it contains two red flags you should consider before installing or allowing autonomous use: - It instructs agents to create and persist private keys (writing them to ~/.monad-wallet or project .env). Do not allow an agent to generate and store long-lived private keys on your behalf unless you fully control and encrypt the storage. Prefer generating keys yourself and providing only short-lived credentials or signing operations. - It requires using a third-party proxy API (agents.devnads.com) for faucet and verification and tells the agent not to use a browser. That proxy will receive your contract standard-json, metadata, and addresses — potentially sensitive build/source material. Prefer official endpoints (e.g., faucet.monad.xyz, official explorer APIs) or verify locally where possible, and review the privacy/security policy for any third-party service before sending code or keys. Recommendations before proceeding: - Ask the skill author what agents.devnads.com is and why it's required; request official endpoints or the option to avoid the proxy. - Refuse or limit automatic wallet persistence; if a wallet must be generated, require the agent to return the private key to you only (not persist it) and instruct you how to securely store it. - Use temporary/test wallets with minimal funds for automated flows, and never expose mainnet private keys to an agent or third-party API. - If you need verification automation, prefer using official verification endpoints or run verification locally, and inspect any request payloads (standard-json/metadata) before sending. Because these choices could lead to credential or source-material exposure, treat this skill as suspicious until the author clarifies the proxy usage and the secure handling of private keys.

Like a lobster shell, security has layers — review code before you run it.

latestvk978cn0h0esjg2v99zyhabz7hs80k0ts

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments