Is cruellacodes/escrow-agent safe?

https://github.com/openclaw/skills/tree/main/skills/cruellacodes/escrow-agent

73
CAUTION

The cruellacodes/escrow-agent skill is an almost entirely empty package whose only file is a .clawhub/lock.json that misidentifies itself as a completely different skill (academic-research-hub). With an empty SKILL.md, the skill cannot currently perform prompt injection or data exfiltration, but the combination of a financial-domain name ('escrow-agent'), an adversarially-named author ('cruellacodes'), and deliberate identity spoofing via lock.json is consistent with a supply chain staging pattern: pass security audit empty, inject malicious content after trust is established. No active malicious behavior was confirmed during this audit, but the structural anomalies and suspicious context warrant caution before installation.

Category Scores

Prompt Injection 80/100 · 30%
Data Exfiltration 65/100 · 25%
Code Execution 88/100 · 20%
Clone Behavior 75/100 · 10%
Canary Integrity 68/100 · 10%
Behavioral Reasoning 20/100 · 5%

Findings (7)

HIGH Lock.json Identity Spoofing: Registers as Different Skill -45

The .clawhub/lock.json file records the installation under the identity 'academic-research-hub' (version 0.1.0, installedAt 1770957475341) rather than 'escrow-agent'. When installed in a production environment, this skill would corrupt the user's skill registry by creating a phantom entry for academic-research-hub. This could: (1) block legitimate installation of a real academic-research-hub skill via duplicate-key collision, (2) cause confusion in skill management UIs, (3) evade skill-name-based security policies that block 'escrow-agent' but permit 'academic-research-hub', or (4) masquerade as a benign research tool while claiming escrow functionality in conversation.

HIGH Empty Financial-Domain Skill — Potential Supply Chain Staging -40

A skill claiming to be an 'escrow agent' (a financial transaction mediator) provides zero instructional content in SKILL.md. This is inconsistent with any legitimate escrow agent implementation, which would require detailed behavioral instructions for handling fund releases, dispute resolution, and counterparty verification. The pattern of an empty skill from an adversarially-named author in a high-risk financial domain is consistent with a staging attack: the skill passes security audit in its current empty state and malicious content is injected via update after trust is established in the registry.

MEDIUM Credential Files Accessed Twice During Audit Session -32

Six sensitive credential files were accessed at two distinct timestamps: once at session initialization (1771957087) and once 30 seconds after skill installation (1771957117). The post-install access at 1771957117.462 shows all six files opened within the same millisecond, which is characteristic of an automated scan rather than adversarial access. The official canary integrity report confirms all files are intact with no exfiltration. Both access patterns are attributed to the oathe audit framework's baseline and post-install verification sweeps. However, the existence of these PATH records warrants documentation.

MEDIUM Post-Install Credential File Access Pattern -20

The pattern of all six credential files being accessed in rapid succession approximately 30 seconds after skill installation is consistent with the oathe audit framework performing its standard post-install canary verification sweep. No content from these files was observed in network traffic. No modification of files occurred. However, in a non-sandboxed production environment where audit infrastructure is not present, the same installation timing could indicate the skill triggering credential enumeration via a side channel not captured here.

LOW External Connections to AWS Infrastructure Active Post-Install -12

Two ESTABLISHED TCP connections to 34.233.6.177:443 (AWS us-east-1) are present in the post-install connection snapshot, attributed to the openclaw-gateway process (pid=1087). These connections were already established prior to skill installation based on process attribution and are part of the audit infrastructure. No connections attributable directly to the skill being tested were detected.

LOW Extremely Minimal Package Containing Only Mismatched Metadata -12

The skill package contains only one file: .clawhub/lock.json. No SKILL.md content, no source code, no configuration, no documentation. The sole file present contains incorrect identity information. This level of minimalism is unusual and could indicate the skill is a placeholder, that installation failed to retrieve actual content, or that the skill was intentionally stripped before distribution.

INFO No Active Prompt Injection Content Detected 0

SKILL.md is completely empty. The skill cannot currently modify agent behavior, override system instructions, request elevated permissions, or inject any instructions into the LLM system prompt. This is the safest possible state with respect to prompt injection risk.