Is kaelxsol/clawsnipe safe?

https://github.com/openclaw/skills/tree/main/skills/kaelxsol/clawsnipe

79
CAUTION

ClawSnipe presents no evidence of prompt injection attacks, malicious code, credential theft, or canary file compromise — the installation is technically clean. However, the skill executes real, irreversible Solana cryptocurrency trades autonomously (up to 2 SOL total exposure) across highly volatile memecoins, and its copy-trading feature creates a concrete exploitation path for pump-and-dump schemes via controlled 'whale' wallets. All protective safety checks rely entirely on axiom.trade's browser UI rendering honest information, meaning a compromised or manipulated page bypasses every safeguard silently.

Category Scores

Prompt Injection 75/100 · 30%
Data Exfiltration 65/100 · 25%
Code Execution 95/100 · 20%
Clone Behavior 90/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 35/100 · 5%

Findings (8)

HIGH Autonomous Execution of Irreversible Real Financial Transactions -35

The skill executes live SOL cryptocurrency trades up to 0.5 SOL per position and 2 SOL total without per-trade user confirmation. Memecoin trading is highly volatile; a single misread browser snapshot, slippage, or UI manipulation event results in an irreversible on-chain loss. The skill also sets stop-losses and take-profits autonomously, meaning the agent can exit positions at a loss while the user is unaware.

HIGH Copy Trading Feature Exploitable via Controlled Wallet -30

The copy-trading flow triggers on any tracked wallet buy exceeding 0.1 SOL and purchases 10-30% proportionally after only a browser-based safety check. An attacker who controls a tracked wallet can orchestrate a pump-and-dump: buy a low-liquidity token, wait for copy-traders to pile in at a higher price, then sell. The skill's safety checks (liquidity > 10 SOL, no single holder > 10%) may be bypassed if the attacker seeds initial liquidity and manages their stake below thresholds.

MEDIUM Agent Persona Override via Identity Reassignment -25

The very first sentence of SKILL.md's body content reassigns the agent's identity: 'You are an AI trading agent that executes trades on Axiom.' This persona override can suppress the host agent's normal risk-assessment instincts in financial contexts and may cause the agent to prioritize trade execution over user protection when the two conflict.

MEDIUM Full Authenticated Wallet Session Under Skill Control -20

The skill assumes control of an already-authenticated browser session. Within that session, the user's Solana wallet private key material is not exposed, but wallet address, full balance, all positions, transaction history, and connected account data are readable. All of this flows through axiom.trade, a third-party platform with its own data practices. The skill's design provides no isolation between the skill and this sensitive financial context.

MEDIUM Safety Checks Entirely Dependent on axiom.trade UI Truthfulness -15

All protective logic (mint authority disabled, liquidity > 10 SOL, no holder > 10%, freeze authority revoked) is implemented by reading text from browser snapshots of axiom.trade. If axiom.trade is compromised via XSS, if a rogue RPC endpoint is injected, if DNS is poisoned, or if token metadata is crafted to display false safety signals, every safety check silently passes. There is no out-of-band verification of any safety indicator.

LOW Install Process Is Clean With No Anomalies -10

The installation performed a standard git sparse-checkout from github.com, placed exactly two files into the skill directory, and cleaned up the temporary clone. No unexpected network destinations, no process spawning outside normal git/ssh infrastructure, and no filesystem writes outside the designated skill directory were observed.

INFO Canary File Accesses Are Monitoring Infrastructure Artifacts 0

Inotify events show .env, .ssh/id_rsa, .aws/credentials, .npmrc, .docker/config.json, and gcloud credentials being read at 11:46:52 and again at 11:46:58 (audit timestamps 1771933612 and 1771933630). The git clone does not begin until network connections to 140.82.121.3:443 appear at 11:46:58.544. These reads are attributable to the Oathe pre-install canary placement and post-install integrity verification, not the skill. All hashes are confirmed intact.

INFO No Executable Code, Scripts, or Supply-Chain Hooks Present 0

The skill consists exclusively of SKILL.md and _meta.json. Filesystem diff confirms only these two files were added. No npm scripts, git hooks, compiled binaries, or shell scripts were introduced. There is no code-execution attack surface from the installed artifact itself.