git clone https://github.com/TermiX-official/cryptoclaw
T=$(mktemp -d) && git clone --depth=1 https://github.com/TermiX-official/cryptoclaw "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/security-check" ~/.claude/skills/termix-official-cryptoclaw-security-check && rm -rf "$T"
skills/security-check/SKILL.mdGoPlus Security API
Quick Access
The
check_address_security tool provides instant address risk assessment. All transfers are also auto-checked before execution.
Assess token contracts, wallet addresses, and approvals for security risks using the free GoPlus API.
Base URL
https://api.gopluslabs.io/api/v1
No API key required. Free tier is sufficient for normal usage.
Security Checks
1. Token Security
GET /token_security/{chain_id}?contract_addresses={address}
Chain IDs:
1 (Ethereum), 56 (BSC), 137 (Polygon), 42161 (Arbitrum), 10 (Optimism), 8453 (Base)
Key response fields:
— token cannot be sold (CRITICAL)is_honeypot
/buy_tax
— percentage tax on trades (HIGH if > 10%)sell_tax
— owner can mint unlimited tokensis_mintable
— ownership is concealedhidden_owner
— owner can reclaim after renouncingcan_take_back_ownership
— contract can self-destructselfdestruct
— upgradeable proxy contractis_proxy
— source code is verifiedis_open_source
— number of holdersholder_count
— number of LP holderslp_holder_count
— anti-whale mechanism presentis_anti_whale
— percentage held by ownerowner_percent
— percentage held by creatorcreator_percent
2. Address Security
GET /address_security/{address}?chain_id={chain_id}
Checks if an address is associated with: phishing, stealing, malicious contracts, or blacklists.
3. Approval Security
GET /approval_security/{chain_id}?contract_addresses={address}
Checks token approval risks: whether the approved contract is malicious or has known exploits.
4. NFT Security
GET /nft_security/{chain_id}?contract_addresses={address}
Checks NFT contract for: privileged operations, restricted transfer, self-destruct, and trading risks.
5. Phishing Site Detection
GET /phishing_site?url={url}
Checks if a URL is a known phishing site. Use this before directing users to any DeFi frontend.
Risk Scoring Workflow
Evaluate the response fields and classify risk:
CRITICAL (do not proceed):
is_honeypot: 1selfdestruct: 1
ANDhidden_owner: 1is_mintable: 1
HIGH (strong warning):
orbuy_tax > 10%sell_tax > 10%can_take_back_ownership: 1
(unverified source)is_open_source: 0owner_percent > 50%
MEDIUM (note to user):
(upgradeable)is_proxy: 1
(alone)is_mintable: 1holder_count < 100
LOW (informational):
is_anti_whale: 1- Minor tax (< 5%)
Risk Report Template
🛡️ Security Report: {token_name} ({symbol}) Chain: {chain_name} | Contract: {address} Risk Level: {CRITICAL|HIGH|MEDIUM|LOW} ✅ Passed: - Open source: Yes - Not a honeypot - No self-destruct ⚠️ Warnings: - Sell tax: 5% - Mintable: Yes - Holder count: 87 ❌ Critical: - (none) Recommendation: {proceed with caution / avoid / safe to interact}
Cross-references
Other skills should invoke security checks:
- token-swap: Check token before executing swaps
- nft-manager: Check NFT contract before purchases
- etherscan: Complement ABI analysis with security data
Example Interactions
User: "Is this token safe? 0x..." → Call
/token_security/56?contract_addresses=0x..., generate risk report
User: "Check this address for me: 0x..." → Call
/address_security/0x...?chain_id=56, report any flags
User: "Are my token approvals safe?" → Call
/approval_security/56?contract_addresses=0x... for each approved contract
User: "Is this DeFi site legit? https://..." → Call
/phishing_site?url=https://..., report result