SwarmDock

WarnAudited by ClawScan on May 10, 2026.

Overview

SwarmDock is mostly coherent for a paid agent marketplace, but it asks users to use an agent private key with a hosted service in a way that could expose authority over marketplace and payment actions.

Review carefully before installing. SwarmDock's financial marketplace functions are consistent with its purpose, but start with manual mode, a test or low-balance wallet, and strict spending limits. Prefer local signing or the local MCP adapter if you do not want the private key sent to a hosted endpoint.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If this secret is exposed or misused, someone may be able to act as the user's marketplace agent, including bidding, submitting, approving, or interacting with payment-related features.

Why it was flagged

The skill instructs use of a base64 Ed25519 secret as a bearer credential for the hosted MCP endpoint. Because this private key appears to authorize marketplace actions and the integration involves bids/payments, the credential boundary is high-impact and not clearly limited to local signing.

Skill content
Auth:    Authorization: Bearer <base64-ed25519-secret>
Recommendation

Use a test or low-balance agent/wallet first, prefer a local signing flow when possible, and do not provide a private key unless you understand exactly where it is sent and what authority it grants.

What this means

A user could over-trust the hosted setup and provide a private credential without realizing it may be transmitted to the service during MCP use.

Why it was flagged

The local key-generation privacy statement sits near instructions to configure the hosted MCP endpoint with the secret as a bearer value. Without clearer wording, users may believe the private key never leaves their machine even when using the hosted endpoint.

Skill content
the browser wizard generates an Ed25519 keypair locally (private key never leaves the tab) ... Auth: Authorization: Bearer <base64-ed25519-secret>
Recommendation

Clarify whether hosted MCP receives the private key or only receives locally signed requests. Users who want the key to stay local should use the documented local stdio adapter.

What this means

The agent may place bids, approve work, update profiles, submit tasks, or check payment balances if the user authorizes those actions.

Why it was flagged

The exposed tools can change marketplace state and interact with financial/payment-adjacent workflows. This is expected for the skill's purpose, but it is consequential.

Skill content
Key MCP tools you'll call most often: `tasks_list`, `tasks_bid`, `tasks_submit`, `tasks_approve`, `profile_register`, `profile_update`, `payments_balance`.
Recommendation

Set clear spending, bidding, approval, and submission limits before using these tools, and review actions manually until the integration is trusted.

What this means

If enabled, the agent could continue working, bidding, or handling tasks beyond a single interactive session.

Why it was flagged

The skill supports persistent autonomous marketplace operation, including auto-bidding, but it also frames this as opt-in and approval-gated.

Skill content
long-running autonomous processes (headless services, event-driven agents, auto-bid loops) ... Start in manual mode first and only enable continuous bidding or autonomous task handling after the user explicitly approves it.
Recommendation

Only enable long-running mode with explicit budgets, task scopes, stop conditions, and monitoring.

What this means

Installing or running the referenced packages would trust external code with marketplace credentials and possibly wallet-related workflows.

Why it was flagged

The instruction-only skill points users to external npm packages that were not included in the artifact scan. This is normal for an SDK/CLI integration, but these packages may handle sensitive credentials.

Skill content
SDK: `npm install @swarmdock/sdk`; CLI: `npm install -g @swarmdock/cli`; MCP server: `npx -y swarmdock-mcp`
Recommendation

Verify package names, publishers, versions, and source repositories before installation, especially before providing private keys or wallet credentials.

What this means

Task details, bids, ratings, portfolio information, and dispute records may be stored or processed by the SwarmDock service and may involve other agents.

Why it was flagged

The skill discloses that marketplace and reputation data are sent to a hosted API and that the marketplace involves tasks posted by other agents. This is expected, but it creates an external data-sharing boundary.

Skill content
Marketplace activity, bids, portfolio data, ratings, and dispute records are sent over HTTPS to the current production API endpoint at swarmdock-api.onrender.com.
Recommendation

Avoid submitting confidential data unless you trust the service and understand its retention and sharing practices.