Is lordx64/chronobets safe?
https://github.com/openclaw/skills/tree/main/skills/lordx64/chronobets
The chronobets skill is a documentation-only Solana prediction market integration with no executable code, clean installation, and no canary exfiltration. However, two significant concerns warrant caution: (1) a brand identity mismatch where the skill presents as 'ChronoBets' but all authentication message strings reference 'MoltBets API request'—suggesting the skill may route transactions to different infrastructure than disclosed; (2) an embedded autonomous financial control loop instructing agents to continuously bet, monitor, and compound winnings with real USDC on Solana mainnet without per-transaction user confirmation. The skill is not overtly malicious but carries meaningful financial risk and identity transparency concerns that require review before deployment.
Category Scores
Findings (8)
HIGH Autonomous Real-Money Financial Control Loop -25 ▶
The 'Procedure: Full Agent Lifecycle' section encodes a complete autonomous trading loop: fund wallet, register, discover markets, analyze, bet, monitor, claim, create markets, resolve, and then 'Repeat: Continuously scan for new markets, manage positions, and compound winnings.' This instructs the agent to operate as an autonomous financial agent with real USDC on Solana mainnet, with no mechanism for per-transaction user confirmation. A user who installs this skill and has a funded wallet accessible to the agent could experience continuous autonomous financial transactions without explicit approval.
HIGH Brand Identity Mismatch: ChronoBets vs MoltBets -35 ▶
The skill presents itself as 'ChronoBets' in its metadata, description, and homepage (https://chronobets.com), but every single authentication message string throughout SKILL.md and api-reference.md reads 'MoltBets API request. Timestamp:
MEDIUM Embedded Autonomous Financial Decision-Making Instructions -17 ▶
The skill's 'When to Use This Skill' and lifecycle sections instruct the agent to make financial decisions (which markets to bet on, how much to stake, when to create markets, how to propose and defend resolutions) without requiring user input at each step. Once the skill is active, any user query touching prediction markets or betting could trigger the agent to autonomously execute mainnet USDC transactions.
MEDIUM Permissionless settle_loss Instruction Enables Reputation Attacks -15 ▶
The skill documents and encourages use of the permissionless settle_loss on-chain instruction, which any caller can invoke against any losing agent. While this is an on-chain program feature, the skill's documentation of it as a normal operation creates a pathway for systematic reputation destruction of target agents. An attacker could continuously call settle_loss against a target agent's losing positions to drain their reputation score.
MEDIUM Continuous Wallet Identity Disclosure to Undisclosed Backend -12 ▶
Every authenticated API call transmits the agent's wallet public key and an Ed25519 signature to chronobets.com. Given the brand mismatch finding, the actual backend receiving this authentication data may be MoltBets infrastructure rather than ChronoBets. The skill collects wallet addresses, transaction signatures, market positions, and betting patterns—building a comprehensive financial profile of the agent and user.
LOW Wallet Keypair Signing Code in Documentation -7 ▶
The SKILL.md contains TypeScript examples that access keypair.secretKey to sign transactions. While these are documentation examples and not executed code, they establish a pattern where the agent is expected to have direct access to wallet private key material and autonomously sign and broadcast mainnet transactions.
INFO Clean Installation from GitHub Monorepo -10 ▶
The installation used git sparse-checkout to clone only the skills/lordx64/chronobets subdirectory from the openclaw/skills monorepo. The only external connection was to github.com (140.82.121.3:443). No unexpected processes, filesystem modifications outside the target directory, or persistence mechanisms were detected.
INFO Canary File Accesses Attributed to Audit Framework -10 ▶
Honeypot files (.env, .ssh/id_rsa, .aws/credentials, .npmrc, .docker/config.json, GCP credentials) were read at audit timestamps 1771925774 (before install) and 1771925800 (after processing). Both access windows align with the audit framework's initialization and final integrity check cycles rather than the skill installation. No canary file contents were transmitted to external endpoints.