wallet-integration

Fail

Audited by Gen Agent Trust Hub on Mar 7, 2026

Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The skill requires managing sensitive private keys and mnemonic phrases via environment variables (e.g., $ETH_PRIVATE_KEY), which can be exposed if the local environment is compromised.
  • [DATA_EXFILTRATION]: The core integration logic involves sending unencrypted private keys to a remote server (https://api.openclaw.com/api/v1/wallet/connect). This is a critical security anti-pattern in blockchain applications, as it grants a third-party service full control over user assets.
  • [EXTERNAL_DOWNLOADS]: The skill requires the installation of the 'openclaw-blockchain' Python package. It also references well-known infrastructure providers such as Infura for blockchain RPC connectivity.
  • [COMMAND_EXECUTION]: The skill uses a proprietary 'claw' command-line interface to execute wallet operations, including transaction signing and fund transfers. This provides the agent with the capability to perform irreversible financial actions on the system.
  • [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it incorporates external data into its operations. 1. Ingestion points: Data is retrieved from blockchain balance queries and real-time event streams via WebSocket (ws://api.openclaw.com/events). 2. Boundary markers: The skill lacks delimiters or explicit instructions to distinguish between blockchain transaction data and executable commands. 3. Capability inventory: The skill has the ability to send transactions ('claw wallet send'), making it a target for malicious instructions embedded in transaction memos. 4. Sanitization: There is no documented validation or sanitization of data received from the blockchain before it is processed by the model.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 7, 2026, 05:44 PM