Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

PayRam MCP Integration

v1.4.2

Stripe banned your account? High-risk merchant? No KYC crypto payments via PayRam MCP — 36 tools, zero setup. Accept USDC/USDT/BTC, create payment links, run...

0· 711·0 current·0 all-time
bySiddharth Menon@buddhasource
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The skill claims 'no KYC, no signup, no API key' and declares no required env vars/credentials, but the SKILL.md and headless docs instruct the agent operator to provide PAYRAM_EMAIL, PAYRAM_PASSWORD, PAYRAM_MNEMONIC and other env vars and to run signup/signin/setup flows. That mismatch (declared requirements: none vs instructions: many secrets and auth-related variables) is incoherent.
!
Instruction Scope
The runtime instructions tell agents to clone repositories, run headless scripts, execute deploy scripts, create wallets, store tokens and mnemonics in .payraminfo files, and to run curl|bash install lines. These steps go beyond simple code snippets generation — they create persistent secrets on disk, deploy smart contracts, and can cause network interactions with payram servers or public RPCs. The instructions also reference connecting to a hosted MCP endpoint (https://mcp.payram.com/mcp), which will send data off-host; none of this is declared in the skill metadata.
!
Install Mechanism
Although the skill is instruction-only (no packaged install spec), it explicitly recommends high-risk installation patterns: 'curl -fsSL https://raw.githubusercontent.com/PayRam/payram-scripts/main/setup_payram.sh | /bin/bash' and cloning & running scripts from GitHub. Download-and-execute from raw URLs and running remote setup scripts is a high-risk practice and should be manually audited before use.
!
Credentials
The skill declares no required environment variables or primary credential, yet the headless setup requires many env vars (PAYRAM_EMAIL, PAYRAM_PASSWORD, PAYRAM_MNEMONIC, PAYRAM_API_URL, RPC URLs, etc.) including sensitive secrets (mnemonic, tokens). Requesting wallet mnemonics and writing them to plaintext files is highly sensitive and not reflected in the metadata — this is disproportionate and not properly declared.
Persistence & Privilege
always:false (normal) and agent invocation is allowed (normal). However, the documentation instructs creating persistent files (.payraminfo/headless-tokens.env and headless-wallet-secret.txt) that store authentication tokens and mnemonics on disk. This persistence is within the skill's stated self-hosted use-case but increases risk if run in an environment with other secrets or network access.
What to consider before installing
Do not run the suggested curl|bash or headless scripts without manual review and isolation. Confirm the upstream GitHub repos and inspect the setup scripts line-by-line before executing. Treat any PAYRAM_MNEMONIC or saved token files as highly sensitive — never provide real mainnet mnemonics or private keys to an untrusted script or agent. If you intend to experiment, do so in an isolated VM or container with ephemeral keys and testnet funds only. Verify legal/AML compliance for your use case — the 'no KYC / no signup' pitch may expose you to regulatory or platform risk. If you need this capability, prefer: (1) auditing the repository code, (2) self-hosting in an air-gapped or well-monitored environment, (3) using ephemeral test keys, and (4) ensuring the agent cannot autonomously exfiltrate files or secrets to external endpoints without explicit approval.

Like a lobster shell, security has layers — review code before you run it.

latestvk974scj2wj5rs6t6tcp62v7xxs826bgv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments