Use this skill when the user wants to purchase a virtual debit card using crypto, create a prepaid card via x402 protocol, check virtual card status, or set up an EVM wallet for card payments. Trigger on: "buy a card", "get a virtual card", "create card", "card status", "setup wallet for card", or any intent involving purchasing virtual Visa/Mastercard with cryptocurrency.

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill matches its card-purchase purpose, but it asks for broad crypto-wallet authority and runs an unpinned external npm tool that can auto-upgrade in the background.

Use this only if you independently trust the npm/GitHub project. Do not provide a main wallet private key; use a dedicated BSC wallet with only the funds needed for the card and gas. Confirm the exact amount before any purchase, and avoid allowing automatic upgrades while the tool has access to wallet credentials.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user could be asked to expose a wallet key when it is not needed, and that key could control all funds in the wallet.

Why it was flagged

The pre-flight flow can request and store a full wallet private key even for status checks, while the status workflow only needs an order number. A raw EVM private key grants broader wallet control than a status lookup or single card payment.

Skill content
Before ANY operation (create, wallet, status) ... Ask user: "Please provide your EVM wallet private key" ... Requires an `orderNo` from a previous creation.
Recommendation

Only request the private key for operations that actually sign or pay. Status checks should work with `orderNo` only. Users should use a dedicated low-balance wallet and never provide a main wallet private key.

What this means

If the npm package or a future version is compromised, it could access the private key or alter payment behavior.

Why it was flagged

The skill runs an unpinned external npm package for every operation, including private-key handling and crypto payment creation, while the reviewed artifact set contains no implementation code for that package.

Skill content
All operations use `npx @aeon-ai-pay/x402-card` ... `npx @aeon-ai-pay/x402-card setup --private-key 0x...`
Recommendation

Pin the npm package version, provide reviewed source or a lockfile, and require explicit user approval before executing any package that handles private keys or payments.

What this means

The tool or skill behavior could change during a wallet/payment workflow before the user has reviewed the update.

Why it was flagged

The skill instructs the agent to start an upgrade check in the background before operations and to run an upgrade after informing the user, without requiring explicit approval.

Skill content
Auto-upgrade skill (background, non-blocking, once per session) ... do NOT wait ... `npx @aeon-ai-pay/x402-card upgrade --check` ... run upgrade
Recommendation

Remove automatic background upgrades. Check for updates only when requested, show what will change, and wait for explicit user approval before upgrading.

What this means

A user may trust the assurance and provide a sensitive private key without being able to verify how the external tool handles it.

Why it was flagged

The skill tells the agent to make a strong private-key safety assurance, but the behavior depends on an external npm CLI whose code is not included in the reviewed artifacts.

Skill content
"It will be stored locally at ~/.x402-card/config.json with restricted file permissions and never transmitted elsewhere."
Recommendation

Avoid absolute safety claims unless the implementation is reviewable and verifiable. Clearly state that users must trust the external package and should use only a dedicated limited-funds wallet.