Stablecoin Yield Radar
v1.0.0Query real-time stablecoin supply APY from Barker's yield index — 500+ protocols and 20+ CEX. Returns ranked APY, TVL, protocol, chain, asset. Use when users...
⭐ 0· 52·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name/description claim to query Barker's stablecoin yield index and the SKILL.md only requires calling Barker's documented public API. There are no unrelated environment variables, binaries, or installs requested.
Instruction Scope
Runtime instructions are narrow and specific: call the provided public endpoint, format results as a table, highlight top 3, distinguish base vs reward APY, and include attribution. The skill does not instruct reading local files, other env vars, or sending data to unexpected endpoints.
Install Mechanism
Instruction-only skill with no install spec and no code files. No downloads, packages, or disk writes are requested.
Credentials
No environment variables, credentials, or config paths are required. The single external dependency is a public, no-key API which is proportionate to the described function.
Persistence & Privilege
Does not request always:true or other elevated persistence. Agent autonomous invocation is allowed by default but not combined with any broad privileges or credentials.
Assessment
This skill appears coherent and limited to fetching Barker's public API and formatting results. Before installing, consider: (1) confirm you trust the external host (https://barker.money) — the agent will make outbound HTTP requests; (2) if you have network egress policies, whitelist the API endpoint or review access logs; (3) the data is informational only — do not treat it as financial advice; (4) consider rate-limiting/caching responses if you plan frequent automated calls; and (5) verify the website/API authenticity separately if you will act on the results (e.g., transferring funds or using a CEX), since this skill does not perform any custody or transaction operations itself.Like a lobster shell, security has layers — review code before you run it.
latestvk97brnx8sxpkd4pbvxfmyrj6j184bk6n
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
