๐ŸฆžClawVerse.io
Skills65MCP30Plugins20Agents20Deploy28Projects99Pulse30
+ Submit
ClawVerse.io โ€” Every Claw. One Universe. ยท Built for the OpenClaw ecosystem
Release v0.1.0 ยท 2026-02-14 ยท 8381118 ยท Data updated: 2026-02-17

Stay in the loop

โ† Back to Skills
defi-token-tracker
๐Ÿ”ด Flaggedโ— Abandoned

Monitor DeFi token prices and wallet balances across chains

Installs
800
Page Views
0
0 in last 30d
Rating / Reviews
โ˜… 2.9 (12)
Last Updated
142d ago
2025-10-15
Required Permissions
This skill requests 4 permissions. Skills with 3+ permissions have a higher risk profile per OWASP MCP-06 (Excessive Permission Scope).
Protocol Support
REST
Compatible Platforms
OpenClaw
Available From
GGitHub
Install
Community security warnings have been reported for this skill. Use with caution.
Security Analysis
โš VirusTotal: Suspicious

Potential threats flagged by some scanners

Overall Security:๐Ÿ”ด Flagged
OWASP MCP RisksView all โ†’
MCP01Tool Poisoningcritical

Review tool descriptions for hidden instructions

MCP02Rug Pullcritical

Pin tool versions and review updates before upgrading

MCP03Transitive Access Abusecritical

Apply principle of least privilege per tool

Permission Risk Breakdown
API Key Accessmedium

Requires API keys or tokens to function. If the tool is compromised, your API keys could be exfiltrated and used for unauthorized access or billing abuse.

  • โ—Access your API quotas and billing
  • โ—Impersonate your identity to services
  • โ—Leak keys to third parties
Network Accesshigh

Can make outbound network requests. A compromised tool can exfiltrate stolen data, download additional payloads, or communicate with command-and-control servers.

  • โ—Send data to external servers
  • โ—Download malicious payloads
  • โ—Establish reverse shells
File Systemhigh

Can read and write files on your system. Malicious tools can steal SSH keys, credentials, browser data, or modify configuration files.

  • โ—Read ~/.ssh/*, ~/.aws/credentials
  • โ—Access browser cookies and passwords
  • โ—Modify config files or inject code
Shell Accesscritical

Can execute arbitrary system commands on your machine. A compromised tool with shell access can install malware, modify system files, or exfiltrate data.

  • โ—Execute system commands (rm, curl, wget)
  • โ—Install or remove software
  • โ—Access other processes and services
Report Security Issue
Community Reviews

No reviews yet. Be the first to review!

Similar Finance Skills
crypto-wallet-sync
๐Ÿ”ด Flagged

Sync and monitor cryptocurrency wallet balances

REST
1,500 installs3.2 (22)
โ—
G
stripe-payments
๐ŸŸข Verified

Process payments, manage subscriptions, and handle Stripe webhooks

MCPRESTWebSocket
4,100 installs4.6 (85)
โ—
CAMO
expense-tracker
๐ŸŸก Reviewed

Track expenses, categorize transactions, and generate reports

MCP
2,600 installs4.3 (43)
โ—
CA
invoice-generator
๐ŸŸก Reviewed

Create professional PDF invoices from structured data

MCP
1,700 installs4.1 (28)
โ—
U