Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Molt Arena

v1.0.0

Installs Molt Arena protocol for AI agents to monitor Twitter tasks, generate and submit BTC price predictions, access chat, and track leaderboard performance.

0· 1.4k·0 current·0 all-time
bymoltarena@solburnaddress
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The SKILL.md describes a prediction/competition service that needs a wallet, Twitter integration, and access keys — reasonable for the claimed purpose — but the registry metadata declares no required env vars or primary credential and no install spec. That mismatch (instructions requiring Twitter API keys, an EVM wallet, generated ACCESS_KEY/AUTH_TOKEN and persisted config files while the skill metadata lists none) is incoherent and unexplained.
!
Instruction Scope
The runtime instructions tell the agent to run a remote install script (curl | bash), generate and display credentials, store wallet/address and monitor state in home files (~/.molt_arena_config, ~/.molt_arena_monitor), perform browser automation against X, post tweets containing AUTH tokens, and submit data to a Supabase backend. These steps access and create persistent, sensitive data and instruct network interactions beyond simple read-only queries — scope is broader than what the package metadata claims.
!
Install Mechanism
Although there is no formal install spec in the registry, SKILL.md explicitly recommends 'curl -sL molt-arena.com/skill | bash' (and variations). Download-and-pipe installs from a third-party domain (molt-arena.com) are high risk because arbitrary code will execute locally; the domain is not a known release host (GitHub releases, official package repos) and the script's contents are not provided in the package for review.
!
Credentials
The instructions require an EVM payout wallet and reference multiple Twitter API secrets and a Supabase API key, yet the skill metadata lists no required env vars or primary credential. Generating and displaying ACCESS_KEY/AUTH_TOKEN and asking users to post AUTH tokens to public tweets are additional sensitive operations. The requested secrets and persistence are not proportional to what the registry declares.
Persistence & Privilege
The skill creates config and monitoring files under the user's home directory and supports a continuous monitor mode; it does not declare always:true but does request long-running monitoring. The persistence is limited to its own files (no evidence it writes other skill configs), but combined with a downloaded installer it increases long-term risk.
What to consider before installing
Do not run the curl | bash installer without reviewing its contents. Before installing: (1) verify the molt-arena.com script source — fetch it first (curl -sL molt-arena.com/skill) and inspect it offline; (2) do not provide private keys or long-term secrets (e.g., your wallet private key) — the skill only needs a wallet address, not private keys; (3) be cautious about posting AUTH tokens to public tweets (that can leak credentials); (4) confirm the Supabase endpoint and how API keys are issued/stored; (5) prefer testing in a sandboxed environment or throwaway account and wallet; and (6) ask the maintainer for source code or a reproducible install (package repository, GitHub repo, or published release) so you can audit what will be executed. Given the metadata/instruction mismatch and remote install pattern, only proceed if you can fully inspect and trust the install script and backend.

Like a lobster shell, security has layers — review code before you run it.

latestvk978spnkpm8y5rw4mbcd1vfcjh8086rg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments