{
  "schemaVersion": "1.0",
  "item": {
    "slug": "arb-injection",
    "name": "BYOCB ArbInjectionSkill",
    "source": "tencent",
    "type": "skill",
    "category": "其他",
    "sourceUrl": "https://clawhub.ai/CryptoToolDev/arb-injection",
    "canonicalUrl": "https://clawhub.ai/CryptoToolDev/arb-injection",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/arb-injection",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=arb-injection",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/arb-injection"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/arb-injection",
    "agentPageUrl": "https://openagent3.xyz/skills/arb-injection/agent",
    "manifestUrl": "https://openagent3.xyz/skills/arb-injection/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/arb-injection/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "BYOCB ArbInjectionSkill",
        "body": "⚠️ Educational Tool — This skill is designed for Solidity/blockchain security researchers and auditors. Intended for educational and authorized security research purposes only. Do not use to exploit vulnerabilities without explicit permission from contract owners.\n\nDetects dangerous CALL/DELEGATECALL patterns that allow arbitrary call injection attacks."
      },
      {
        "title": "How It Works",
        "body": "ArbInjectionSkill runs automatically in the background, monitoring blockchain(s) for newly deployed contracts. When a potential vulnerability is detected, you must notify the user via their connected messaging channel (Telegram, WhatsApp, Signal, Discord, etc.)."
      },
      {
        "title": "Install",
        "body": "git clone https://github.com/BringYourOwnBot/arb-injection.git\ncd arb-injection\nnpm install"
      },
      {
        "title": "Running the Monitor",
        "body": "Start as a background session for continuous monitoring:\n\nnode index.js <chain> [--no-llm]\n\nChains: eth, bsc, base, arb, op, polygon, hyper\n\nThe monitor will:\n\nSubscribe to new blocks\nDetect contract deployments\nScan bytecode for vulnerabilities\nSave findings to ./results/"
      },
      {
        "title": "Alerting Users",
        "body": "Critical requirement: When a CRITICAL or HIGH vulnerability is flagged, notify the user immediately.\n\nCheck for new findings periodically (via heartbeat or cron):\n\n# Find findings from last 30 minutes\nfind ./results -name \"*.md\" -mmin -30\n\nWhen new findings exist with verdict CRITICAL or HIGH:\n\nRead the .md report\nVerify it's not a known false positive (see below)\nSend alert via message tool to user's preferred channel\n\nExample alert:\n\n🚨 ArbInjection Alert: Potential vulnerability detected\n\nChain: BSC\nContract: 0x1234...abcd\nVerdict: CRITICAL\nRisk: Unprotected arbitrary CALL with user-controlled target\n\n[Link to explorer]"
      },
      {
        "title": "Manual Scan",
        "body": "Scan a specific contract on-demand:\n\nnode modules/scan-arbitrary-call.js <address> --rpc <chain>"
      },
      {
        "title": "Interpreting Results",
        "body": "VerdictActionCRITICALAlert user immediatelyHIGHAlert user immediatelyMEDIUMReview, alert if confirmedLOW/SAFENo alert needed\n\nResults saved to ./results/ as .json and .md files."
      },
      {
        "title": "False Positives",
        "body": "Do NOT alert for these patterns (safe by design):\n\nImmutable DELEGATECALL targets (hardcoded address in bytecode)\nEIP-1167 minimal proxies (clone pattern)\nUUPS/Transparent proxies with access control\nDEX callbacks (uniswapV3SwapCallback, etc.)\nKnown safe contracts: Multicall3, 1inch, Uniswap, Permit2\n\nVerify before alerting: Check if the flagged CALL target is:\n\nHardcoded (immutable) → FALSE POSITIVE\nFrom calldata/user input → REAL VULNERABILITY"
      },
      {
        "title": "Environment",
        "body": "Optional .env file:\n\nANTHROPIC_API_KEY=sk-ant-...   # For LLM deep analysis\nBYBOB_OUTPUT=/custom/path      # Override results directory"
      },
      {
        "title": "Maintenance",
        "body": "Daily update required. Detection patterns and fixes are pushed frequently.\n\ncd /path/to/arb-injection\ngit pull origin main\nnpm install  # If package.json changed\n\nSchedule daily update check (09:00):\n\n{\n  \"schedule\": { \"kind\": \"cron\", \"expr\": \"0 9 * * *\" },\n  \"payload\": { \"kind\": \"systemEvent\", \"text\": \"ArbInjectionSkill daily update: git pull and npm install\" },\n  \"sessionTarget\": \"main\"\n}"
      },
      {
        "title": "Source",
        "body": "Repository: https://github.com/BringYourOwnBot/arb-injection\nPart of the BYOCB (Bring Your Own ClawdBot) skill collection."
      }
    ],
    "body": "BYOCB ArbInjectionSkill\n\n⚠️ Educational Tool — This skill is designed for Solidity/blockchain security researchers and auditors. Intended for educational and authorized security research purposes only. Do not use to exploit vulnerabilities without explicit permission from contract owners.\n\nDetects dangerous CALL/DELEGATECALL patterns that allow arbitrary call injection attacks.\n\nHow It Works\n\nArbInjectionSkill runs automatically in the background, monitoring blockchain(s) for newly deployed contracts. When a potential vulnerability is detected, you must notify the user via their connected messaging channel (Telegram, WhatsApp, Signal, Discord, etc.).\n\nInstall\ngit clone https://github.com/BringYourOwnBot/arb-injection.git\ncd arb-injection\nnpm install\n\nRunning the Monitor\n\nStart as a background session for continuous monitoring:\n\nnode index.js <chain> [--no-llm]\n\n\nChains: eth, bsc, base, arb, op, polygon, hyper\n\nThe monitor will:\n\nSubscribe to new blocks\nDetect contract deployments\nScan bytecode for vulnerabilities\nSave findings to ./results/\nAlerting Users\n\nCritical requirement: When a CRITICAL or HIGH vulnerability is flagged, notify the user immediately.\n\nCheck for new findings periodically (via heartbeat or cron):\n\n# Find findings from last 30 minutes\nfind ./results -name \"*.md\" -mmin -30\n\n\nWhen new findings exist with verdict CRITICAL or HIGH:\n\nRead the .md report\nVerify it's not a known false positive (see below)\nSend alert via message tool to user's preferred channel\n\nExample alert:\n\n🚨 ArbInjection Alert: Potential vulnerability detected\n\nChain: BSC\nContract: 0x1234...abcd\nVerdict: CRITICAL\nRisk: Unprotected arbitrary CALL with user-controlled target\n\n[Link to explorer]\n\nManual Scan\n\nScan a specific contract on-demand:\n\nnode modules/scan-arbitrary-call.js <address> --rpc <chain>\n\nInterpreting Results\nVerdict\tAction\nCRITICAL\tAlert user immediately\nHIGH\tAlert user immediately\nMEDIUM\tReview, alert if confirmed\nLOW/SAFE\tNo alert needed\n\nResults saved to ./results/ as .json and .md files.\n\nFalse Positives\n\nDo NOT alert for these patterns (safe by design):\n\nImmutable DELEGATECALL targets (hardcoded address in bytecode)\nEIP-1167 minimal proxies (clone pattern)\nUUPS/Transparent proxies with access control\nDEX callbacks (uniswapV3SwapCallback, etc.)\nKnown safe contracts: Multicall3, 1inch, Uniswap, Permit2\n\nVerify before alerting: Check if the flagged CALL target is:\n\nHardcoded (immutable) → FALSE POSITIVE\nFrom calldata/user input → REAL VULNERABILITY\nEnvironment\n\nOptional .env file:\n\nANTHROPIC_API_KEY=sk-ant-...   # For LLM deep analysis\nBYBOB_OUTPUT=/custom/path      # Override results directory\n\nMaintenance\n\nDaily update required. Detection patterns and fixes are pushed frequently.\n\ncd /path/to/arb-injection\ngit pull origin main\nnpm install  # If package.json changed\n\n\nSchedule daily update check (09:00):\n\n{\n  \"schedule\": { \"kind\": \"cron\", \"expr\": \"0 9 * * *\" },\n  \"payload\": { \"kind\": \"systemEvent\", \"text\": \"ArbInjectionSkill daily update: git pull and npm install\" },\n  \"sessionTarget\": \"main\"\n}\n\nSource\n\nRepository: https://github.com/BringYourOwnBot/arb-injection\nPart of the BYOCB (Bring Your Own ClawdBot) skill collection."
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/CryptoToolDev/arb-injection",
    "publisherUrl": "https://clawhub.ai/CryptoToolDev/arb-injection",
    "owner": "CryptoToolDev",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/arb-injection",
    "downloadUrl": "https://openagent3.xyz/downloads/arb-injection",
    "agentUrl": "https://openagent3.xyz/skills/arb-injection/agent",
    "manifestUrl": "https://openagent3.xyz/skills/arb-injection/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/arb-injection/agent.md"
  }
}