Skip to content
← Registry
Trust Report

monzo

Access Monzo bank account - check balance, view transactions, manage pots, send feed notifications. For personal finance queries and banking automation.

65
SUSPICIOUS
Format: openclawScanner: v0.8.0Duration: 13msScanned: 4d ago · May 7, 2:28 AMSource →
Embed this badge
AgentVerus SUSPICIOUS 65AgentVerus SUSPICIOUS 65AgentVerus SUSPICIOUS 65
[![AgentVerus](https://agentverus.ai/api/v1/skill/5f625cf1-16c7-4bc5-83ee-c6f077cf69ed/badge)](https://agentverus.ai/skill/5f625cf1-16c7-4bc5-83ee-c6f077cf69ed)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/5f625cf1-16c7-4bc5-83ee-c6f077cf69ed/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"5f625cf1-16c7-4bc5-83ee-c6f077cf69ed","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/5f625cf1-16c7-4bc5-83ee-c6f077cf69ed/trust

Category Scores

54
Permissions
75
Injection
52
Dependencies
56
Behavioral
70
Content
100
Code Safety

Findings (17)

lowUnknown external reference

The skill references an unknown external domain which is classified as low risk.

https://your-server.com/webhook

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
highCapability contract mismatch: inferred command execution is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: Shell

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred system modification is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: chmod

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCredential access detected-25

Found credential access pattern: "Credentials file"

### "Credentials file not found"

Remove references to credentials and secrets. Skills should never access sensitive authentication data.

injectionASST-05
highSystem modification detected-20

Found system modification pattern: "systemd unit"

Reference it from your systemd unit with `EnvironmentFile=/etc/openclaw/monzo.env`.

Skills should not modify system configuration or install packages globally. Bundle required dependencies.

behavioralASST-03
mediumCapability contract mismatch: inferred file write is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: stores the password in plaintext in the config file. Ensure the file

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://developers.monzo.com/

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
mediumCapability contract mismatch: inferred local service access is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: http://localhost

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumFinancial/payment actions detected-10

Found financial/payment actions pattern: "bank account"

description: Access Monzo bank account - check balance, view transactions, manage pots, send feed notifications. For personal finance queries and banking automation.

Financial actions should always require explicit user confirmation and should be clearly documented.

behavioralASST-09
mediumHigh-risk workflow lacks explicit safety boundaries-15

The skill performs or enables higher-risk operations but does not define explicit safety boundaries describing what it must not do.

No safety boundary patterns found alongside high-risk capability language

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09
mediumMany external URLs referenced (6)-8

The skill references 6 external URLs and also discusses auth/API/payment workflows, which increases the chance that sensitive operations depend on many remote endpoints.

URLs: https://developers.monzo.com/, http://localhost, https://developers.monzo.com/**, http://localhost`, https://...

Minimize external dependencies to reduce supply chain risk.

dependenciesASST-04
mediumSystem modification detected (inside code block)-6

Found system modification pattern: "~/.bashrc"

Add to your shell profile (`~/.bashrc`, `~/.zshrc`, etc.):

Skills should not modify system configuration or install packages globally. Bundle required dependencies.

behavioralASST-03
mediumUnknown external reference-8

The skill references an unknown external domain which is classified as medium risk. Merged overlapping signals from the repeated finding family: - Unknown external reference

https://developers.monzo.com/

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
mediumLocal service URL reference-8

The skill references a localhost or private-network service URL which is classified as medium risk. Merged overlapping signals from the repeated finding family: - Local service URL reference

http://localhost

Review localhost/private-network service references carefully. Local service URLs can expose internal apps, admin panels, or developer tooling to agent-driven workflows.

dependenciesASST-04
mediumLocal service access detected (inside code block)-5

Found local service access pattern: "http://localhost"

# - Set Redirect URL: http://localhost

Treat localhost and loopback services as privileged local attack surfaces. Require explicit approval, constrain reachable ports, and avoid combining local access with session reuse or tunneling.

behavioralASST-03
lowFederated auth flow detected (inside code block)-3

Found federated auth flow pattern: "OAuth"

# 2. Create OAuth client at https://developers.monzo.com/

Treat OAuth, 2FA, and token-refresh guidance as authentication-sensitive workflows. Explain scope, storage, and refresh behavior clearly so agents do not handle more credential material than necessary.

behavioralASST-05
infoError handling instructions present

The skill includes error handling instructions for graceful failure.

Error handling patterns detected

Keep these error handling instructions.

contentASST-09