clawr
Audited by Socket on Mar 1, 2026
2 alerts found:
AnomalySecurityThe concept presents a monetized AI API relying on environment keys and external payments. While no malicious code is shown, the design hinges on secure secret management, proper access control for /api/ask, rigorous input handling, safe logging practices, and a robust payment integration. The absence of concrete implementation details makes it impossible to certify security; key areas require secure defaults before deployment.
No unequivocal signs of obfuscated malware or backdoors were found in the provided documentation and example code. The dominant risks are supply-chain and centralization: reliance on a single external facilitator (https://x402.org/facilitator) for payment verification and discovery, and installing unpinned third-party @x402 packages that execute in the host runtime. Recommended mitigations: vet and audit @x402 packages, pin versions and verify checksums, prefer cryptographically-signed payment receipts or add server-side attestation where possible, limit how much metadata is exposed in 402 responses, implement rate limiting and logging redaction, and design a graceful fallback for facilitator downtime. Treat the facilitator as a high-sensitivity trusted service and minimize unnecessary leakage of endpoint and payment metadata.