Polymarket Whale Tracker

v1.0.0

Track the top Polymarket whale wallets and copy their winning trades. Monitors the monthly leaderboard, shows open positions, and identifies high-conviction...

0· 99·0 current·0 all-time
byMike@themsquared
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, SKILL.md, and the included Python script all describe the same behavior (fetch leaderboard, fetch positions/trades, display/monitor). The required dependencies (requests) and usage are proportional to the stated purpose.
Instruction Scope
SKILL.md instructs the agent/user to run the provided script and install requests. The script only performs HTTP GETs against polymarket data endpoints, prints output, and optionally loops in watch mode; it does not read local secrets or unrelated files, nor does it send data to third-party endpoints.
Install Mechanism
There is no install spec beyond recommending pip install requests. No remote archive downloads, no brew/npm installs, and no code is written to disk beyond the provided file.
Credentials
The skill declares no required environment variables, secrets, or config paths and the code does not attempt to read any. Network access is limited to polymarket's public Data and Gamma APIs and known polymarket URLs.
Persistence & Privilege
always is false and the skill does not modify other skills or system settings. It runs only when invoked and its only ongoing action is optional polling (watch mode) within the process.
Assessment
This skill appears internally consistent and only queries public Polymarket APIs; it doesn't request credentials or touch other system files. Before installing, note: (1) it will make outbound HTTP requests to polymarket domains (necessary for its function), (2) running automated 'copy whale trades' strategies carries financial risk — review and test before using real funds, and (3) if you plan to run it continuously, be aware of rate limits and network exposure. If you want extra assurance, inspect the script locally (no obfuscated code) and run it in a restricted environment.

Like a lobster shell, security has layers — review code before you run it.

latestvk975dgxdpp3zm1r799e0mxgbfn83c9q4

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments