key-derivation
Warn
Audited by Socket on Mar 18, 2026
1 alert found:
AnomalyAnomaly.clawnet/unsigned-skill.json
LOWAnomalyLOW
.clawnet/unsigned-skill.json
The fragment itself does not contain executable malware, but the opaque opReturnHex payload, combined with hardcoded signer artifacts and cryptography-focused references, represents medium to moderate risk. Downstream components that decode and act on opReturnHex could inadvertently derive keys or exfiltrate sensitive material if provenance, decoding safeguards, and trust anchors are not properly enforced. Recommend restricting decoding to a controlled, verifiable environment and validating provenance of all cryptographic artifacts before integration.
Confidence: 65%Severity: 58%
Audit Metadata