AAWP

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill's code, files, and runtime instructions are coherent with its stated purpose as an AI-agent wallet (daemon + native signing binary + chain integrations), but it requires careful review before use because it installs a persistent signing daemon and a native addon which have strong privileges.

This skill is internally consistent with its stated purpose (an autonomous AI-agent wallet), but it requires high trust to run: 1) A compiled native addon (.node) and a persistent daemon are included — review the binary hash and source repository before running. 2) Provisioning creates and stores encrypted seed material and a guardian private key locally; keep backups offline and never share recovery material. 3) The daemon can sign and submit on-chain transactions; only continue if you trust the code and the provenance of the binary. 4) Test in a sandbox or on a small/testnet wallet first; do not use on a machine holding large funds until you've audited the native binary and reviewed scripts. 5) Verify the install/provision URLs (raw.githubusercontent.com and aawp.ai) and prefer cloning the public repo and inspecting files yourself rather than running automated installers. 6) If you use an OpenClaw client, confirm the human-approval gates (provision, create, cron registration, approveBinary) are enforced in your environment.

Static analysis

Env harvesting

Critical
Finding
Environment variable access combined with network send.

Env harvesting

Critical
Finding
Environment variable access combined with network send.

Env harvesting

Critical
Finding
Environment variable access combined with network send.

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Potential exfiltration

Warn
Finding
File read combined with network send (possible exfiltration).

Potential exfiltration

Warn
Finding
File read combined with network send (possible exfiltration).

Potential exfiltration

Warn
Finding
File read combined with network send (possible exfiltration).

VirusTotal

VirusTotal engine telemetry is currently malicious for this artifact.

View on VirusTotal

Risk analysis

No visible risk-analysis findings were reported for this release.