Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
privy-integration
v0.2.0Integrates Privy authentication, embedded wallets, and agent payment protocols into web and agentic apps. Covers React SDK (PrivyProvider, hooks, wagmi), Nod...
⭐ 0· 50·0 current·0 all-time
byMisha Kolesnik@tenequm
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description claim to integrate Privy auth/wallets/payments — the SKILL.md and reference docs indeed describe server SDK usage, wallet creation/export, token verification, and agentic/autonomous wallets. Those capabilities legitimately require privileged secrets (appId/appSecret, webhook signing secret, MPP recipient, etc.), yet the skill's registry metadata declares no required env vars or credentials. That mismatch (no declared credentials vs. instructions that obviously need them) is incoherent.
Instruction Scope
The runtime instructions (SKILL.md + references) instruct the agent/developer to: create and manage server-side wallets, export private keys, configure webhook signing secrets, store PRIVY_APP_ID/PRIVY_APP_SECRET in agent config (~/.openclaw/openclaw.json), and install/clone third-party repos (clawhub install, git clone). These steps access and may persist sensitive secrets and private keys and also give guidance for autonomous agent wallets. The instructions go beyond purely UI integration and include high-privilege server and key-management operations.
Install Mechanism
This is an instruction-only skill with no install spec or code files to execute. That reduces direct supply-chain risk (the skill itself won't drop binaries). However, the included references encourage running external commands (clawhub, git clone) and npm installs; those are external actions initiated by the user, not performed by this skill automatically.
Credentials
Although registry metadata lists no required env vars or primary credential, the documentation repeatedly references environment variables (NEXT_PUBLIC_PRIVY_APP_ID, PRIVY_APP_ID, PRIVY_APP_SECRET, PRIVY_WEBHOOK_SIGNING_SECRET, MPP_RECIPIENT, etc.). Requiring an app secret and the ability to export private_key (references/server-sdk.md) is expected for server-side Privy usage, but the omission in metadata is misleading and increases risk: users may install without realizing the skill expects high-privilege secrets. Multiple sensitive variables are used but not declared.
Persistence & Privilege
always:false (normal). The docs instruct storing Privy credentials in the user's OpenClaw config (~/.openclaw/openclaw.json) for agent access; that is a persistent credential placement that grants any agent with access to that config the ability to call Privy APIs and operate wallets. This is not intrinsically malicious but raises the blast radius and requires explicit, cautious user consent and least-privilege practices.
What to consider before installing
This skill's content appears to be a detailed integration guide for Privy and legitimately needs high-privilege secrets (appId/appSecret, webhook signing secret) and operations like creating/exporting wallets and signing transactions. However, the skill metadata incorrectly lists no required credentials — that's a red flag because it can lull you into underestimating the risk. Before installing or enabling this skill:
- Verify the source and publisher (there is no homepage and source is unknown). Prefer official Privy documentation or packages (npm orgs, GitHub repo) you can audit.
- Do NOT place production App Secrets or private keys in the agent config or environment until you understand who/what will access them; test with a throwaway Privy app and testnet funds only.
- The skill guides you through exporting private keys and storing secrets in ~/.openclaw/openclaw.json — treat that as highly sensitive: store only in secure vaults and give the least privilege necessary.
- If you plan to enable agentic/autonomous wallets, add restrictive policies, require human approval for high-value ops, and monitor webhooks closely.
- Ask the publisher to update the registry metadata to list required env vars (PRIVY_APP_ID, PRIVY_APP_SECRET, PRIVY_WEBHOOK_SIGNING_SECRET, MPP_RECIPIENT, etc.) and to provide an authoritative source URL or signed release so you can verify provenance.
If you cannot confirm the skill's origin or are unable to test safely in an isolated environment, avoid granting it access to real credentials or production funds.Like a lobster shell, security has layers — review code before you run it.
latestvk976bns2s5nzy9abc26cp8e811846930
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
