Meme Coin Scanner
v2.0.0Scan new meme coins for risks and opportunities — honeypot detection, liquidity analysis, holder concentration.
⭐ 0· 414·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the included scripts: the bash wrapper runs embedded Python that queries public token APIs (DexScreener and related sites) and prints risk heuristics. There are no unrelated credentials, binaries, or surprising capabilities requested.
Instruction Scope
SKILL.md directs the agent to run bundled scripts which perform network requests to public scanner APIs and print checklists. The instructions do not ask the agent to read unrelated files or exfiltrate secrets. They do perform network calls to public endpoints (expected for this purpose).
Install Mechanism
No install spec is provided (instruction/script-based), so nothing is downloaded or extracted at install time. The only runtime artifacts are the included scripts, which are plain text and invoked directly.
Credentials
The skill declares no required environment variables or credentials. At runtime the scripts read HOME/XDG_DATA_HOME and optionally MEME_COIN_SCANNER_DIR to create local directories (e.g., ~/.meme-scanner or XDG data path) and log activity. This is proportionate to the function, but be aware logs may include command arguments (token addresses).
Persistence & Privilege
always:false and no special privileges requested. The skill creates and writes to its own data/log directory only and does not modify other skills or system-wide agent settings.
Assessment
This skill appears to do what it says: it queries public token APIs (DexScreener, etc.), prints heuristics and checklists, and stores logs under a per-user data directory. Before installing, consider: 1) it will create and write logs under your home/XDG data dir (which may include token addresses or command arguments); 2) it performs network requests to public APIs — if you run it in a sensitive environment, prefer network isolation; 3) it does not request API keys or other secrets, but the tips mention optional API keys (not required) — do not supply unrelated credentials. Finally, treat results as informational only (not financial advice) and cross-check using independent tools.Like a lobster shell, security has layers — review code before you run it.
chinesevk97cyqzdd2294kwmw2y89g8gfd82pjzylatestvk977twgc5dgzrxgdx0ytsjbth583237wproductivityvk97cyqzdd2294kwmw2y89g8gfd82pjzy
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
