Exposed secret literal
- Finding
- File appears to expose a hardcoded API secret or token.
Security checks across static analysis, malware telemetry, and agentic risk
ProxyClaw coherently provides proxy scraping, but it promotes anti-bot evasion, uses sensitive proxy credentials, and includes an optional persistent bandwidth-sharing node that needs careful review.
Install only if you knowingly need residential proxy scraping. Use a rotatable, low-quota IPLoop key, monitor usage, and avoid private or unauthorized targets. Do not run the earning Docker node unless you accept routing third-party traffic through your network; verify and pin the image, isolate it, and remove it when done.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
An agent could use this to access sites in ways that violate site rules, trigger blocking, consume proxy credits, or create legal/compliance risk.
The skill is not just a basic proxy; it advertises bypassing anti-bot protections and is intended for agent-run scraping of arbitrary sites.
Stealth mode uses advanced browser fingerprinting + residential IPs: ... Bypasses Cloudflare, Akamai, and most anti-bot systems
Use only for authorized, permitted scraping of appropriate targets; require explicit user approval for sensitive, logged-in, CAPTCHA-protected, or high-volume targets.
A leaked or overused API key could spend the user's proxy bandwidth or allow someone else to use the account's proxy quota.
The user's API key is converted into the proxy password and supplied to curl for each request, which consumes the user's quota and may expose the key to local process inspection depending on platform and curl behavior.
AUTH="iploop:${IPLOOP_API_KEY}" ... --proxy-user "$AUTH"Use a separate low-quota key where possible, run only on trusted single-user systems, monitor IPLoop usage, and rotate the key if exposure is suspected.
Users may trust the credential handling more than they should and run the tool in environments where other users or processes can observe command arguments.
The supplied fetch.sh builds a secret-bearing auth string and passes it to curl via `--proxy-user`, so the security claim is overconfident or under-supported.
API key passed via `--proxy-user` (not in URL or command line args visible in `ps aux`)
Treat the API key as sensitive, avoid shared hosts, and prefer credential mechanisms that do not place secrets in command arguments.
A changed or compromised image could run persistent code on the user's machine and route traffic through the user's network.
The recommended earning node pulls a mutable `latest` Docker image from an external registry without a digest or signature in the artifacts.
docker run -d --name iploop-node --restart=always ultronloop2026/iploop-node:latest
Do not run the node unless needed; verify the image source, pin a digest or reviewed version, and run it in an isolated environment.
Third-party proxy traffic may continue through the user's home or office connection, using bandwidth and potentially exposing the user to abuse complaints or reputation risk.
The earning node is designed to keep operating as a residential proxy endpoint after setup; the docs also recommend a Docker run mode with `--restart=always`.
Share — Your idle bandwidth serves proxy requests through real residential IPs
Only run the bandwidth-sharing node with explicit intent; monitor it, avoid `--restart=always` unless necessary, and know how to stop and remove the container.
Sensitive target URLs or non-HTTPS content may be visible to the proxy service.
The skill discloses that requests are mediated by the IPLoop proxy and arbitrary target sites; this is purpose-aligned, but the proxy provider receives request metadata and the API key.
Network destinations | `proxy.iploop.io:8880` (proxy gateway) + user-specified target URLs
Avoid sending private or sensitive URLs/data through the proxy unless you trust the provider; prefer HTTPS targets.