Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

x402 Creative Resources

v1.0.0

Access Xona's x402 creative resource APIs on api.xona-agent.com. Includes creative director (design research), image generation (nano-banana, seedream, grok-...

0· 549·2 current·2 all-time
byXona Labs@xona-labs
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill's stated purpose (paid x402 calls for image/video/news/token intelligence) legitimately requires a payment-capable wallet, so needing wallet access is plausible — but the manifest/requirements list claims no env vars or credentials while the included script requires XONA_WALLET_SECRET. This mismatch is a red flag (either the manifest is incomplete or the skill is trying to obtain a raw private key unexpectedly).
!
Instruction Scope
SKILL.md instructs running scripts in the agent workspace to call api.xona-agent.com and states the agent wallet 'pays automatically', but it does not document the required XONA_WALLET_SECRET environment variable. The runtime script reads this secret and passes it to a third-party client library, which could sign transactions locally or transmit the private key to remote code — the manifest and instructions do not make this behavior explicit.
Install Mechanism
There is no install spec; the repository includes a package.json declaring an npm dependency (@dexterai/x402). That means the code relies on an npm package but the skill does not specify how/when it will be installed. Using an npm client library is reasonable but should be explicitly declared and vetted; missing install instructions reduce transparency.
!
Credentials
The script requires a highly sensitive env var (XONA_WALLET_SECRET — a Solana private key). Requiring a raw private key is high privilege and should be clearly declared, justified, and handled via secure platform-managed signing rather than a plaintext env var. The manifest currently lists no required credentials, creating an incoherence between declared and actual needs.
Persistence & Privilege
The skill does not request always:true and does not appear to modify other skills or global agent settings. However, autonomous invocation combined with access to a wallet private key increases the blast radius (the agent could autonomously trigger paid calls); the skill does not document user confirmation behavior for payments.
What to consider before installing
This skill will attempt to use a Solana private key (XONA_WALLET_SECRET) to pay for API calls. Before installing: 1) Confirm the manifest is corrected to list required credentials; 2) Do not supply a production/private wallet key as a plaintext env var — prefer platform-managed signing or an ephemeral/test wallet with minimal funds; 3) Audit the npm package @dexterai/x402 (source, reputation, versions) to ensure it doesn't exfiltrate keys; 4) Require explicit user confirmation for any payment calls or restrict the agent from autonomous invocation when wallet access is present; 5) If you cannot verify the endpoint (api.xona-agent.com) and the npm package, avoid giving the skill a wallet secret. If the developer can update the manifest to declare XONA_WALLET_SECRET and explain how signing is done securely (e.g., local signing, no key transmission), re-evaluate; currently the mismatch between declared and actual requirements is the main concern.

Like a lobster shell, security has layers — review code before you run it.

latestvk9701v25vg704x11a07rg08y5h81ccg7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments