Alpaca Py Cli

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If live Alpaca keys are configured, an agent mistake or ambiguous request could place real trades or cause financial loss.

Why it was flagged

The skill gives an agent live-capable order execution authority. The artifacts do not show clear per-order human confirmation, spend limits, symbol limits, or paper-only enforcement.

Skill content
"execute orders via natural language" ... "Live Trading (real money)" ... "Real money, real risk"
Recommendation

Keep paper mode enabled by default, require explicit human confirmation for every order with symbol/side/quantity/account mode, and enforce account-side limits before using live keys.

What this means

The agent could be exposed to trading credentials or account setup flows that the user expected to handle manually.

Why it was flagged

The setup instructions contemplate agent-assisted financial account registration and API-key acquisition, then saving those keys, while the boundaries for what the agent may see or handle are unclear.

Skill content
"Use browser automation to complete registration steps automatically" ... "After obtaining keys via browser, call `alpaca auth` to save them"
Recommendation

Have the user perform registration and API-key generation manually where possible; if an agent assists, keep secrets out of transcripts, require explicit consent, and use paper or least-privilege keys.

What this means

The agent may run an unreviewed or unexpected `alpaca` executable from the user’s PATH or workspace.

Why it was flagged

The provided artifact set contains no code files, but setup expects a local alpaca executable. For a high-impact trading skill, the actual command behavior is not present for review.

Skill content
"Use full path: ~/.openclaw/workspace/skills/alpaca-py-cli/scripts/alpaca, or add scripts directory to PATH"
Recommendation

Publish and review the CLI code or pin a trusted install source; before running commands, verify `which alpaca` and inspect the executable that will handle credentials and trades.

What this means

Users may underestimate how exposed their Alpaca API keys are once saved into shell startup files.

Why it was flagged

The documentation makes a reassuring claim that conflicts with its own warning that shell-access agents can read environment variables.

Skill content
"Agents with shell access can read environment variables" ... "✅ Agent can't access keys directly"
Recommendation

Clarify that agents or processes with shell access may read or use the environment variables, and remove the claim that the agent cannot access keys directly.