security-check

Assess token and address security via the GoPlus Security API.

202 stars

Best use case

security-check is best used when you need a repeatable AI agent workflow instead of a one-off prompt. It is especially useful for teams working in multi. Assess token and address security via the GoPlus Security API.

Assess token and address security via the GoPlus Security API.

Users should expect a more consistent workflow output, faster repeated execution, and less time spent rewriting prompts from scratch.

Practical example

Example input

Use the "security-check" skill to help with this workflow task. Context: Assess token and address security via the GoPlus Security API.

Example output

A structured workflow result with clearer steps, more consistent formatting, and an output that is easier to reuse in the next run.

When to use this skill

  • Use this skill when you want a reusable workflow rather than writing the same prompt again and again.

When not to use this skill

  • Do not use this when you only need a one-off answer and do not need a reusable workflow.
  • Do not use it if you cannot install or maintain the related files, repository context, or supporting tools.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/security-check/SKILL.md --create-dirs "https://raw.githubusercontent.com/TermiX-official/cryptoclaw/main/skills/security-check/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/security-check/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How security-check Compares

Feature / Agentsecurity-checkStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Assess token and address security via the GoPlus Security API.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# GoPlus Security API

## Quick Access

The `check_address_security` tool provides instant address risk assessment. All transfers are also auto-checked before execution.

Assess token contracts, wallet addresses, and approvals for security risks using the free GoPlus API.

## Base URL

```
https://api.gopluslabs.io/api/v1
```

No API key required. Free tier is sufficient for normal usage.

## Security Checks

### 1. Token Security

```
GET /token_security/{chain_id}?contract_addresses={address}
```

Chain IDs: `1` (Ethereum), `56` (BSC), `137` (Polygon), `42161` (Arbitrum), `10` (Optimism), `8453` (Base)

Key response fields:

- `is_honeypot` — token cannot be sold (CRITICAL)
- `buy_tax` / `sell_tax` — percentage tax on trades (HIGH if > 10%)
- `is_mintable` — owner can mint unlimited tokens
- `hidden_owner` — ownership is concealed
- `can_take_back_ownership` — owner can reclaim after renouncing
- `selfdestruct` — contract can self-destruct
- `is_proxy` — upgradeable proxy contract
- `is_open_source` — source code is verified
- `holder_count` — number of holders
- `lp_holder_count` — number of LP holders
- `is_anti_whale` — anti-whale mechanism present
- `owner_percent` — percentage held by owner
- `creator_percent` — percentage held by creator

### 2. Address Security

```
GET /address_security/{address}?chain_id={chain_id}
```

Checks if an address is associated with: phishing, stealing, malicious contracts, or blacklists.

### 3. Approval Security

```
GET /approval_security/{chain_id}?contract_addresses={address}
```

Checks token approval risks: whether the approved contract is malicious or has known exploits.

### 4. NFT Security

```
GET /nft_security/{chain_id}?contract_addresses={address}
```

Checks NFT contract for: privileged operations, restricted transfer, self-destruct, and trading risks.

### 5. Phishing Site Detection

```
GET /phishing_site?url={url}
```

Checks if a URL is a known phishing site. Use this before directing users to any DeFi frontend.

## Risk Scoring Workflow

Evaluate the response fields and classify risk:

**CRITICAL** (do not proceed):

- `is_honeypot: 1`
- `selfdestruct: 1`
- `hidden_owner: 1` AND `is_mintable: 1`

**HIGH** (strong warning):

- `buy_tax > 10%` or `sell_tax > 10%`
- `can_take_back_ownership: 1`
- `is_open_source: 0` (unverified source)
- `owner_percent > 50%`

**MEDIUM** (note to user):

- `is_proxy: 1` (upgradeable)
- `is_mintable: 1` (alone)
- `holder_count < 100`

**LOW** (informational):

- `is_anti_whale: 1`
- Minor tax (< 5%)

## Risk Report Template

```
🛡️ Security Report: {token_name} ({symbol})
Chain: {chain_name} | Contract: {address}

Risk Level: {CRITICAL|HIGH|MEDIUM|LOW}

✅ Passed:
- Open source: Yes
- Not a honeypot
- No self-destruct

⚠️ Warnings:
- Sell tax: 5%
- Mintable: Yes
- Holder count: 87

❌ Critical:
- (none)

Recommendation: {proceed with caution / avoid / safe to interact}
```

## Cross-references

Other skills should invoke security checks:

- **token-swap**: Check token before executing swaps
- **nft-manager**: Check NFT contract before purchases
- **etherscan**: Complement ABI analysis with security data

## Example Interactions

User: "Is this token safe? 0x..."
→ Call `/token_security/56?contract_addresses=0x...`, generate risk report

User: "Check this address for me: 0x..."
→ Call `/address_security/0x...?chain_id=56`, report any flags

User: "Are my token approvals safe?"
→ Call `/approval_security/56?contract_addresses=0x...` for each approved contract

User: "Is this DeFi site legit? https://..."
→ Call `/phishing_site?url=https://...`, report result

Related Skills

healthcheck

202
from TermiX-official/cryptoclaw

Host security hardening and risk-tolerance configuration for OpenClaw deployments. Use when a user asks for security audits, firewall/SSH/update hardening, risk posture, exposure review, OpenClaw cron scheduling for periodic checks, or version status checks on a machine running OpenClaw (laptop, workstation, Pi, VPS).

github

211
from TermiX-official/cryptoclaw

GitHub operations via `gh` CLI: issues, PRs, CI runs, code review, API queries. Use when: (1) checking PR status or CI, (2) creating/commenting on issues, (3) listing/filtering PRs or issues, (4) viewing run logs. NOT for: complex web UI interactions requiring manual browser flows (use browser tooling when available), bulk operations across many repos (script with gh api), or when gh auth is not configured.

gifgrep

211
from TermiX-official/cryptoclaw

Search GIF providers with CLI/TUI, download results, and extract stills/sheets.

zkvm-evaluator

202
from TermiX-official/cryptoclaw

Trustless ERC-8183 job evaluation — run Client's verification program inside a zkVM with ZK proof.

xurl

202
from TermiX-official/cryptoclaw

A CLI tool for making authenticated requests to the X (Twitter) API. Use this skill when you need to post tweets, reply, quote, search, read posts, manage followers, send DMs, upload media, or interact with any X API v2 endpoint.

whale-watcher

202
from TermiX-official/cryptoclaw

Monitor large transactions and whale movements on-chain.

weather

202
from TermiX-official/cryptoclaw

Get current weather and forecasts via wttr.in or Open-Meteo. Use when: user asks about weather, temperature, or forecasts for any location. NOT for: historical weather data, severe weather alerts, or detailed meteorological analysis. No API key needed.

wallet-manager

202
from TermiX-official/cryptoclaw

Create, import, and manage blockchain wallets securely.

wacli

202
from TermiX-official/cryptoclaw

Send WhatsApp messages to other people or search/sync WhatsApp history via the wacli CLI (not for normal user chats).

voice-call

202
from TermiX-official/cryptoclaw

Start voice calls via the OpenClaw voice-call plugin.

video-frames

202
from TermiX-official/cryptoclaw

Extract frames or short clips from videos using ffmpeg.

trello

202
from TermiX-official/cryptoclaw

Manage Trello boards, lists, and cards via the Trello REST API.