ApeWisdom Reddit Scanner

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: apewisdom Version: 1.0.0 The skill bundle is benign. The `SKILL.md` provides clear instructions for using the `scan_reddit.py` script, with no evidence of prompt injection attempts against the agent. The Python script `scan_reddit.py` makes a single type of external network request to the `https://apewisdom.io/api/v1.0/filter` endpoint, which is directly aligned with its stated purpose of fetching Reddit sentiment data from the ApeWisdom API. There is no evidence of data exfiltration, malicious execution, persistence mechanisms, or obfuscation.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the skill contacts ApeWisdom to retrieve live market-sentiment data.

Why it was flagged

The script performs a fixed outbound GET request to ApeWisdom based on the selected filter. This is disclosed by the skill purpose and does not include local files or credentials.

Skill content
BASE_URL = "https://apewisdom.io/api/v1.0/filter" ... response = requests.get(url)
Recommendation

Use it if you are comfortable relying on ApeWisdom as the data provider, and treat results as informational rather than financial advice.

What this means

Users have less provenance context and may need to ensure Python dependencies such as requests are available locally.

Why it was flagged

The registry does not provide an upstream source or install/dependency specification. The included code is short and purpose-aligned, so this is a transparency/setup note rather than a security concern.

Skill content
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.
Recommendation

Review the included script before running it and install only in an environment where the Python dependency setup is understood.