Exposed secret literal
- Finding
- File appears to expose a hardcoded API secret or token.
Security checks across static analysis, malware telemetry, and agentic risk
This is a coherent instruction-only guide for x402 crypto payments, but it naturally involves private keys, transaction signing, and automatic payment flows that users should control carefully.
Install/use this skill only if you intend to develop x402 payment flows. Do not provide production private keys unless you have strong controls; start on testnets, use dedicated low-balance wallets, set spending limits, and review any code that automatically pays after an HTTP 402 response.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A funded key used with generated code can authorize real on-chain payments or facilitator transactions.
The skill declares private signing keys used to authorize wallet payments or facilitator actions.
EVM_PRIVATE_KEY (optional) - EVM signer key for x402 client/server.; APTOS_PRIVATE_KEY (optional) - Aptos signer for x402 on Aptos.; FACILITATOR_KEY (optional) - Self-hosted facilitator signing key.
Use dedicated testnet or low-balance wallets, avoid sharing production private keys with general agents, and set explicit spending and network limits.
If adapted to untrusted endpoints without limits, an agent or app could pay for resources automatically.
The documented client wrapper can automatically create a signed payment when a paid endpoint returns HTTP 402.
const response = await api.get("http://localhost:4021/weather");
// Payment handled automatically on 402 responseRequire user confirmation or enforce budgets, maximum prices, trusted facilitator URLs, and endpoint allowlists before enabling automatic payment clients.
Persistent maximum approvals increase the impact of future misuse or compromised signing flows.
The EVM documentation includes a standard but broad token approval pattern that can persist on-chain.
Direct approval - user submits `approve(Permit2, MaxUint256)` transaction
Prefer limited approvals where possible, use dedicated wallets, monitor token allowances, and revoke approvals when no longer needed.
Payment metadata and signed authorizations may be sent to the configured facilitator endpoint as part of normal operation.
Payment payloads are intentionally forwarded to a facilitator service for verification and settlement.
Server -> POST /verify to Facilitator -> POST /settle to Facilitator
Use trusted facilitator endpoints, prefer test networks during development, and review what payment data is forwarded in production.