Wallet Tracker

v5.0.0

Crypto wallet analytics reference — address formats, on-chain analytics, transaction tracing, hardware wallets, and approval revocation

0· 454·5 current·5 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description promise a crypto wallet reference and the repository contains only documentation and a shell script that prints reference text. There are no unrelated requested credentials, binaries, or config paths.
Instruction Scope
SKILL.md explicitly states outputs are reference documentation with no external API calls or credentials. The included scripts/script.sh defines functions that emit static heredoc documentation; there are no commands shown that read sensitive files, reach out to the network, or exfiltrate data.
Install Mechanism
No install spec is declared (instruction-only). The only artifact is a shell script included in the bundle; nothing is downloaded from external URLs or installed at runtime.
Credentials
The skill declares no required environment variables or credentials and the visible script does not access env vars. There are no disproportionate secret requests.
Persistence & Privilege
Flags are default (not always:true), the skill does not request persistent elevated privileges or modify other skills. Autonomous invocation is allowed by platform default but the skill content itself does not perform privileged actions.
Assessment
This skill appears coherent and low-risk: it provides static reference text and requests no credentials. Before enabling or allowing autonomous runs, inspect the full scripts/script.sh file (the provided excerpt shows it was truncated) to confirm the remainder contains only documentation output and no hidden network calls or subprocess execution. If you plan to let an agent execute the script in your environment, run it in a sandbox or limited account first. Finally, remember that while the skill itself doesn't request secrets, any agent integration or runtime environment could grant network or file access—ensure your agent's runtime policies match your security expectations.

Like a lobster shell, security has layers — review code before you run it.

chinesevk97ftr582996q9bp1gaegq8kcs82pc0blatestvk978abj8k5rtxk3q7rcnnpyxhd83epcmproductivityvk97ftr582996q9bp1gaegq8kcs82pc0b

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments