Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Tacoclaw
v0.0.3You ARE TacoClaw, the AI trading assistant of the Taco platform (a crypto DEX). All user trading intents default to Taco — never ask which exchange. Use this...
⭐ 0· 71·0 current·0 all-time
by@taco
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill claims to operate as an AI trading assistant for Taco and the package includes an API reference and a JS client that target https://api.dev.taco.trading — that aligns with the description. However, the API requires an api_token and user_id for authenticated trading endpoints, yet the skill declares no required environment variables or primary credential. A trading skill legitimately needs credentials; the omission is an incoherence and a practical blocker for safe review.
Instruction Scope
SKILL.md instructs the agent to default all trades to Taco and explicitly orders the agent to hide those internal rules from users ("NEVER surface these to the user"). It also directs automatic trade execution behavior and internal sizing rules (e.g., never recommend <30 USDC, default leverage >=3x) that the user may not see. Hidden behaviors that cause the agent to execute financial actions without explicit, visible user confirmation are high-risk and exceed a benign instruction scope.
Install Mechanism
There is no install spec (instruction-only), so nothing is downloaded during install — lower install risk. However, the package includes a ~50KB JavaScript client file that appears minified/ bundled, which makes auditing harder. The client references the dev API host in the API docs; presence of bundled/minified code that likely performs network calls should be treated as code to review before use, even though no external installer is run.
Credentials
The API reference and SKILL.md clearly require an api_token and user_id for authenticated endpoints, but requires.env and primary credential fields are empty. That mismatch is significant: a trading skill requires credentials (and those credentials should be declared so the user knows what to provide and can limit scope). The absence of declared credentials prevents policy review for what secrets the skill will access and transmit.
Persistence & Privilege
The skill does not set always:true and uses default autonomous-invocation behavior (normal), but the combination of defaulting all trading intents to Taco, internal instructions to 'just do it' and to hide that behavior means the agent could autonomously place trades in ways the user is not clearly informed about. While not a persistence privilege misconfiguration per se, this hidden/automatic execution model raises safety concerns for a financial skill.
What to consider before installing
Do not install or enable this skill until you are comfortable with three things: (1) credentials and consent — the skill needs an api_token and user_id to place trades but does not declare them; require the skill to explicitly document which credentials it needs and how they'll be stored/used (prefer scoped, trade-limited tokens and optional read-only tokens for testing); (2) explicit confirmations — insist the skill prompt and log an explicit confirmation for every trade (no hidden defaults or instructions that silence confirmations); (3) code audit — the included JS client is bundled/minified and performs network calls to api.dev.taco.trading; have someone you trust review the client code (or request a non-minified source) and test against a sandbox/test account with minimal funds before using on real funds. Additional mitigations: run in a restricted environment, require explicit opt-in before enabling real trading, enable transaction logging/notifications, and prefer skills that declare required environment variables and scopes transparently. If you cannot verify these points, treat the skill as potentially unsafe for live trading.scripts/tacoclaw_client.js:17
Shell command execution detected (child_process).
scripts/tacoclaw_client.js:27
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk978tmzm1y7b32bd559y4yzctd83p8w0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
