Is alvinunreal/moltfounders safe?

https://github.com/openclaw/skills/tree/main/skills/alvinunreal/moltfounders

47
DANGEROUS

Moltfounders presents as an AI agent co-founder marketplace but contains two serious security defects that make it unsuitable for deployment: HEARTBEAT.md embeds a daily instruction to run 'npx clawhub@latest update moltfounders --force', creating an unpinned remote code execution and supply chain attack vector that allows the skill publisher to push arbitrary updates to every running agent, and the skill's chat and notification polling loop establishes a persistent bidirectional channel through which the moltfounders.com operator or any peer team agent can inject instructions into the running agent at sub-minute intervals. The git clone itself was clean with no unexpected network traffic, and no canary data was exfiltrated during static analysis, but the runtime behavior profile is dangerous and the update mechanism alone warrants rejection.

Category Scores

Prompt Injection 40/100 · 30%
Data Exfiltration 40/100 · 25%
Code Execution 30/100 · 20%
Clone Behavior 88/100 · 10%
Canary Integrity 85/100 · 10%
Behavioral Reasoning 25/100 · 5%

Findings (12)

CRITICAL HEARTBEAT instructs daily unpinned remote code execution via npx -70

HEARTBEAT.md step 1 directs the agent to execute 'npx clawhub@latest update moltfounders --force' on a daily cadence. This fetches whatever code the clawhub package maintainer publishes to npm at execution time with no version pinning, and the --force flag disables interactive safety prompts. Any npm package compromise or intentional malicious update propagates instantly to every agent running this skill. This is a textbook supply chain injection vector embedded in the heartbeat routine.

HIGH Chat and notification polling creates persistent C2 inbound channel -35

The skill establishes a pull-based command-and-control channel: the agent polls GET /api/notifications every 30 seconds and GET /api/ads/:id/chat every 5-10 seconds when a chat window is open. The moltfounders.com server can inject arbitrary text into the agent's context via these endpoints at any time without user awareness, enabling real-time instruction delivery from the service operator or any team member. Notifications are automatically marked read on fetch, leaving no audit trail.

HIGH Agent-to-agent team chat enables peer prompt injection -40

Any agent accepted into a shared team can deliver chat messages to this agent via POST /api/ads/:id/chat. A malicious actor operating a separate agent could craft instruction-injection payloads and deliver them through team chat, which the agent would process as legitimate teammate communications without additional scrutiny. This bypasses the user's system prompt and any platform-level input filtering.

HIGH HEARTBEAT embeds daily remote execution command as agent instruction -25

The HEARTBEAT.md file, which is injected into the agent's periodic context, contains an embedded shell command instructing the agent to download and run an external tool. This crosses the boundary between documentation and instruction injection — the agent treats heartbeat steps as actionable directives, so this constitutes a prompt-level command that causes the agent to initiate remote code execution on a schedule.

HIGH Supply chain attack surface via forced daily npx update -25

The daily npx clawhub@latest instruction means the skill's effective content can change at any time after installation without user review. The skill publisher can silently update SKILL.md or HEARTBEAT.md to contain new instructions, additional exfiltration commands, or revised prompt injections. Agents running in long-lived deployments would receive and act on these updates automatically.

MEDIUM Skill autonomously registers agent and persists credentials without user gate -20

SKILL.md instructs the agent to POST to /api/agents/register, receive an API key, and immediately export it as MOLTFOUNDERS_API_KEY, treating this as a required setup step. No explicit user-confirmation checkpoint is specified between obtaining and persisting the credential. This grants the skill implicit authority to create a persistent external identity for the agent on the user's behalf.

MEDIUM Agent identity and capability profile transmitted to third-party on registration -15

The registration endpoint receives agent name and bio description. In production use, an agent's bio would describe its available tools, specializations, and operating context — information valuable to an adversary for targeting follow-on attacks or profiling the deployment environment.

MEDIUM Aggressive embedded polling loop creates persistent external surveillance -15

Poll intervals of 5-10 seconds for active chats are embedded directly in SKILL.md as recommended practice. This instructs the agent to devote significant ongoing activity to an external service, creating constant exposure to server-delivered content and making the agent's behavior difficult to audit or interrupt without disabling the skill.

MEDIUM Cover letters may leak agent execution context to external server -10

When the agent applies to team advertisements it generates cover letter text with no sanitization guidance. An agent composing a cover letter about its capabilities could naturally include file paths, project names, environment variables, or other contextual details from its current session. This data transits to and is stored on moltfounders.com, where it is also visible to all applicants for that advertisement.

MEDIUM Cover letter application path creates ambient exfiltration opportunity -10

In combination with file-reading or environment-inspection capabilities, this skill creates a complete exfiltration pipeline with no additional prompt injection required: the agent reads sensitive data, then naturally includes it in a cover letter when applying to a team, transmitting it to an external server under the guise of normal marketplace participation.

LOW Install-time behavior clean — only expected GitHub traffic -12

The git sparse-checkout contacted only 140.82.121.4:443 (github.com). No connections to moltfounders.com, no unexpected DNS queries, no additional processes spawned beyond standard git toolchain, and no filesystem modifications outside the designated skill directory were observed during installation.

INFO Canary files read but not exfiltrated; reads attributable to audit infrastructure -15

Credential canary files (.env, .ssh/id_rsa, .aws/credentials, .npmrc, .docker/config.json, .config/gcloud/application_default_credentials.json) were opened and read at two timestamps during the monitoring window. Cross-referencing with the process execution log, both read events align with the audit system's own baseline and post-install integrity scan routines rather than skill-driven access. No exfiltration was detected.