ApeWisdom Reddit Scanner
PassAudited by VirusTotal on May 12, 2026.
Overview
Type: OpenClaw Skill Name: apewisdom Version: 1.0.0 The skill bundle is benign. The `SKILL.md` provides clear instructions for using the `scan_reddit.py` script, with no evidence of prompt injection attempts against the agent. The Python script `scan_reddit.py` makes a single type of external network request to the `https://apewisdom.io/api/v1.0/filter` endpoint, which is directly aligned with its stated purpose of fetching Reddit sentiment data from the ApeWisdom API. There is no evidence of data exfiltration, malicious execution, persistence mechanisms, or obfuscation.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Running the skill contacts ApeWisdom to retrieve live market-sentiment data.
The script performs a fixed outbound GET request to ApeWisdom based on the selected filter. This is disclosed by the skill purpose and does not include local files or credentials.
BASE_URL = "https://apewisdom.io/api/v1.0/filter" ... response = requests.get(url)
Use it if you are comfortable relying on ApeWisdom as the data provider, and treat results as informational rather than financial advice.
Users have less provenance context and may need to ensure Python dependencies such as requests are available locally.
The registry does not provide an upstream source or install/dependency specification. The included code is short and purpose-aligned, so this is a transparency/setup note rather than a security concern.
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.
Review the included script before running it and install only in an environment where the Python dependency setup is understood.
