Orderly Api Authentication

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is an instruction-only authentication guide that discusses wallet signing and API keys for Orderly Network; the sensitive authority is clearly related to its stated purpose.

This looks like a documentation-only guide for Orderly authentication, not an executable package. Before using it, confirm you are on the correct Orderly mainnet/testnet endpoints, verify any wallet-signing request before approval, and protect or revoke Ed25519 API keys if they are exposed.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If a user signs the wrong wallet message or mishandles an API key, an account or trading workflow could be affected.

Why it was flagged

The guide covers authentication steps that can authorize account-level and financial operations. This is expected for an Orderly authentication skill, but it is sensitive authority.

Skill content
Wallet Authentication ... Account registration ... API key management (add/remove keys) ... Privileged operations (withdrawals, admin)
Recommendation

Only sign messages and create API keys for the intended Orderly environment and broker; verify domains, chain IDs, and requested permissions before approving.

What this means

An incorrectly scoped or exposed API key could be used to make authenticated requests on the user’s account.

Why it was flagged

The documentation explains how a generated signing key is used to authenticate future API calls, including trading and account-data requests. This is central to the skill’s purpose, but misuse of such keys can affect account actions.

Skill content
Ed25519 key is used for all subsequent API calls
Recommendation

Use least-privilege API keys where supported, keep private keys out of shared prompts/logs, and revoke keys if they may have been exposed.