Gated Alpha

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill is clear that it buys crypto alpha, but the provided instructions give an agent wallet-signing/payment authority and webhook-driven purchase logic without clear approval, spending, or verification safeguards.

Review this skill carefully before use. If you install it, use a separate low-balance wallet, never paste a main wallet private key into agent-visible code, require manual approval for every purchase, set strict spending limits, verify webhooks, and pin/review the x402 and viem dependencies.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent or runtime mishandles this key, funds in that wallet could be spent or the wallet could be compromised.

Why it was flagged

The purchase workflow requires access to a wallet private key capable of signing x402/USDC payments, even though the registry metadata declares no primary credential.

Skill content
const account = privateKeyToAccount('0x<your-private-key>');
Recommendation

Use a dedicated low-balance wallet, keep the private key in a secrets manager or wallet service rather than source text, and require explicit user approval for each paid purchase.

What this means

The agent could make real USDC purchases, potentially repeatedly, based on incoming events or API responses.

Why it was flagged

The decision flow directs the agent to purchase automatically after simple filtering, and the payment wrapper signs the payment challenge without a documented confirmation, total budget, or recipient/amount validation step.

Skill content
else:
  → Purchase via x402 ... // Automatically handles: 402 challenge -> sign ERC-3009 -> retry with payment header
Recommendation

Add explicit human confirmation, hard per-call and daily spend limits, validation of payment amount and recipient, and clear stop/unsubscribe controls before any paid call.

What this means

A spoofed or malformed webhook could influence the agent's purchase decisions if the receiving endpoint trusts webhook contents directly.

Why it was flagged

The provided webhook flow shows external messages driving the buy decision but does not show a signature, shared secret, origin check, or allowlist step before processing.

Skill content
When a matching alpha drops, your endpoint receives: POST https://your-agent.xyz/hooks/alpha ... Acknowledge fast. Return 200 immediately, then process async.
Recommendation

Require signed webhooks or a shared secret, verify the sender, allowlist Gated Alpha URLs, and do not purchase solely from unauthenticated webhook payloads.

What this means

Users must rely on whatever package versions are present locally, which can affect security and reproducibility.

Why it was flagged

The skill depends on external npm packages, but the provided artifacts include no install spec or pinned versions. This is purpose-aligned but leaves dependency provenance to the user.

Skill content
`@x402/core`, `@x402/evm`, `@x402/fetch`, and `viem` must be installed. Run from a directory where these packages exist in `node_modules`.
Recommendation

Install from trusted package registries, pin versions, review the dependency tree, and run the purchase code in an isolated environment.

What this means

The user may keep receiving alpha events, and downstream automation may keep reacting, until the subscription is disabled.

Why it was flagged

The webhook subscription is an ongoing external registration. It is disclosed and purpose-aligned, but it can continue delivering events after the initial setup.

Skill content
Register a webhook once. New matching alpha is delivered to your endpoint the moment it drops.
Recommendation

Track subscription IDs, document how to unsubscribe, and pause downstream buying automation when the user no longer wants the service active.