Is a1denvalu3/cashu safe?

https://github.com/openclaw/skills/tree/main/skills/a1denvalu3/cashu

75
CAUTION

The a1denvalu3/cashu skill wraps the legitimate Nutshell Cashu ecash CLI but embeds behavioral instructions that create significant financial security risks: it mandates bypassing all payment confirmations (--yes flag) and instructs the agent to automatically pay any HTTP 402 response without user approval. Installation was clean with no credential exfiltration or unexpected network activity, but when active alongside any HTTP-capable skill, the 402 auto-pay pattern enables silent wallet drainage by any server the agent contacts. The skill lacks any safety rails, transaction limits, or user confirmation guidance expected of a financial instrument.

Category Scores

Prompt Injection 57/100 · 30%
Data Exfiltration 75/100 · 25%
Code Execution 88/100 · 20%
Clone Behavior 95/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 50/100 · 5%

Findings (10)

HIGH Mandatory --yes Flag Removes All Payment Confirmations -20

The skill embeds an explicit instruction in SKILL.md that agents MUST pass --yes to every cashu command. This is framed as non-optional ('mandatory for agent use') to prevent 'hanging.' The effect is that the agent will execute all fund transfers — send, pay, melt — without any confirmation dialog or user approval. For a financial instrument controlling real Bitcoin, this is a critical safety gap embedded directly in the injected skill text.

HIGH 402 Auto-Pay Pattern Normalizes Autonomous Fund Transfer -18

The skill includes an explicit 'Agentic Pattern' section instructing the agent to detect HTTP 402 responses with X-Cashu headers and immediately pay them without consulting the user, then retry the original request. The skill explicitly frames this as equivalent to handling auth redirects or rate limits — collapsing the conceptual distinction between financial and non-financial network operations. Any attacker who can make the agent call a URL they control can trigger payment.

HIGH Cross-Skill Wallet Drainer Attack Vector -30

When this skill is active alongside any skill that makes HTTP requests (web browsing, API calls, tool use), a malicious server can silently drain the user's ecash wallet. The attack chain: (1) user asks agent to fetch data from any URL, (2) attacker-controlled endpoint returns HTTP 402 with X-Cashu header pointing to attacker's mint, (3) agent pays without confirmation per skill instructions, (4) agent retries with token. Entire flow is invisible to user. No confirmation step exists in the prescribed flow.

MEDIUM Skill Controls Real Financial Wallet With No Transaction Limits -15

The skill manages a live Bitcoin/ecash wallet at ~/.cashu containing real funds. The skill provides no guidance on transaction amount limits, user confirmation thresholds, or per-session spending caps. Any attacker who can trigger the 402 flow or directly instruct the agent to 'send' can move arbitrary amounts up to the wallet balance without user awareness.

MEDIUM No Safety Rails for Agent Financial Operations -15

A well-designed financial skill for agent use should include explicit guidance to confirm amounts with the user before execution, set per-session limits, and log all transactions. This skill does the opposite: it mandates confirmation bypass and frames automated payment as the desired behavior. There is no defensive guidance for the agent anywhere in the skill.

MEDIUM LNURL Static Lightning Address Creates Trackable Identity -10

The skill's LNURL section instructs the agent to create a static Lightning Address (e.g., [email protected]) for the user's wallet. This persistent address can be used to correlate all incoming payments across sessions, de-anonymize the user's financial activity, and link the wallet to a stable identifier — undermining the privacy properties of Cashu/ecash.

LOW PyPI Package Installation Represents Supply Chain Risk -12

The skill's install step runs 'pipx install cashu' from PyPI. While the nutshell/cashu project at cashubtc/nutshell is legitimate, PyPI package names can be squatted and packages can be compromised post-publication. If the 'cashu' package on PyPI is ever compromised, the install step would execute attacker code in the user's environment.

LOW Rapid Version Churn From Pseudonymous Author -5

Four versions published in approximately 5 days (0.18.6, 0.19.4, 0.19.5, 0.19.6) from an author listed only as 'OpenClaw User' with no public identity or changelog. Rapid iteration on a skill that embeds behavioral instructions around financial operations is a yellow flag for iterative refinement of manipulation techniques.

INFO Install Connected Only to GitHub — Clean Network Behavior 0

During installation monitoring, the only external network connection observed was to 140.82.121.4:443 (GitHub HTTPS) for the git sparse-checkout clone. No connections to third-party servers, C2 infrastructure, or unexpected destinations were detected.

INFO No Credential Exfiltration Observed During Install 0

Honeypot canary files were placed at .env, .ssh/id_rsa, .aws/credentials, .npmrc, .docker/config.json, and .gcloud/application_default_credentials.json. Post-install verification confirmed all files intact. The read accesses observed in inotify and auditd logs for these paths were exclusively from the monitoring framework's own setup and verification passes, not from any skill-attributed process.