Env harvesting
- Finding
- Environment variable access combined with network send.
Security checks across static analysis, malware telemetry, and agentic risk
The skill's code, files, and runtime instructions are coherent with its stated purpose as an AI-agent wallet (daemon + native signing binary + chain integrations), but it requires careful review before use because it installs a persistent signing daemon and a native addon which have strong privileges.
This skill is internally consistent with its stated purpose (an autonomous AI-agent wallet), but it requires high trust to run: 1) A compiled native addon (.node) and a persistent daemon are included — review the binary hash and source repository before running. 2) Provisioning creates and stores encrypted seed material and a guardian private key locally; keep backups offline and never share recovery material. 3) The daemon can sign and submit on-chain transactions; only continue if you trust the code and the provenance of the binary. 4) Test in a sandbox or on a small/testnet wallet first; do not use on a machine holding large funds until you've audited the native binary and reviewed scripts. 5) Verify the install/provision URLs (raw.githubusercontent.com and aawp.ai) and prefer cloning the public repo and inspecting files yourself rather than running automated installers. 6) If you use an OpenClaw client, confirm the human-approval gates (provision, create, cron registration, approveBinary) are enforced in your environment.
VirusTotal engine telemetry is currently malicious for this artifact.
No visible risk-analysis findings were reported for this release.