solana-token-distribution

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This skill matches its Solana airdrop purpose, but it can guide an agent to sign and submit large mainnet token transactions with a wallet private key and reduced transaction checks.

Use this only with a dedicated distribution wallet and after a devnet test. Confirm the recipient list, total token amount, mint, network, fees, and every batch before signing. Do not paste seed phrases or valuable private keys into the agent; prefer a local or hardware signer and pinned dependencies.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A bad recipient list, amount, mint, or payer choice could be submitted on-chain at scale and may not be reversible.

Why it was flagged

The large-batch airdrop path signs and submits transactions while explicitly skipping preflight checks. This is purpose-aligned for fast Solana distribution, but it reduces validation before irreversible on-chain actions.

Skill content
const confirmedSig = await sendAndConfirmTx(connection, tx, {
            skipPreflight: true,
            commitment: "confirmed",
          });
Recommendation

Require an explicit final user approval before signing, test on devnet, validate recipient and amount totals, and default to preflight/simulation unless the user knowingly opts out.

What this means

Using a main wallet or pasting a private key into an agent workflow could authorize unintended financial actions or expose funds if mishandled.

Why it was flagged

The workflow requires a Solana private key capable of signing minting and distribution transactions. This is expected for the task, but it is high-impact signing authority and the registry only declares HELIUS_API_KEY, with no primary credential.

Skill content
const PAYER = Keypair.fromSecretKey(/* your key */);
Recommendation

Use a dedicated low-balance distribution wallet, avoid pasting private keys into chat or generated files, prefer a local/hardware signer, and confirm every transaction batch before signing.

What this means

If mis-scoped, extra agents or MCP tools could read more local context than intended.

Why it was flagged

The skill permits subagents and MCP access, which can move context across tools. It is scoped to read-only documentation and requires asking when stuck, so this is a notice rather than a concern.

Skill content
ask to spawn a read-only subagent with `Read`, `Glob`, `Grep`, and DeepWiki MCP access, loading `skills/ask-mcp`. Scope reads to skill references, example repos, and docs.
Recommendation

Keep subagent access read-only and limited to documentation/example repositories; do not include wallet keys, seed phrases, or private recipient datasets unless explicitly needed and approved.

What this means

Installing unpinned dependencies in a new project can expose the user to supply-chain changes or version drift.

Why it was flagged

The examples depend on external npm packages, but the skill is instruction-only and provides no pinned package versions or lockfile. This is normal for reference guidance, but dependency provenance remains the user's responsibility.

Skill content
import { CompressedTokenProgram } from "@lightprotocol/compressed-token"; ... import { ComputeBudgetProgram, Keypair, PublicKey } from "@solana/web3.js";
Recommendation

Install packages from official sources, pin versions, use a lockfile, and review dependency updates before running wallet-signing scripts.