Skip to content
← Registry
Trust Report

aperture

Install and run Aperture, the L402 Lightning reverse proxy from Lightning Labs. Use when creating L402 paywalls, configuring paid API endpoints, hosting paid content for other agents, or testing L402 authentication flows.

47
REJECTED
Format: openclawScanner: v0.7.1Duration: 42msScanned: 6d ago · Apr 2, 5:25 AMSource →
Embed this badge
AgentVerus REJECTED 47AgentVerus REJECTED 47AgentVerus REJECTED 47
[![AgentVerus](https://agentverus.ai/api/v1/skill/e26cc92d-7911-4673-a5cf-86cab4487d79/badge)](https://agentverus.ai/skill/e26cc92d-7911-4673-a5cf-86cab4487d79)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/e26cc92d-7911-4673-a5cf-86cab4487d79/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"e26cc92d-7911-4673-a5cf-86cab4487d79","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/e26cc92d-7911-4673-a5cf-86cab4487d79/trust

Category Scores

84
Permissions
100
Injection
68
Dependencies
40
Behavioral
20
Content
100
Code Safety

Findings (10)

criticalSecurity bypass instructions-40

The skill contains instructions related to: security bypass instructions.

Disable Authentication

Remove all harmful content instructions. Skills must not enable dangerous activities.

contentASST-07
highCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://localhost:8081/api/test

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
highCapability contract mismatch: inferred local service access is not declared-10

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://localhost:8081

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highLocal file access detected (inside code block)-15

Found local file access pattern: "`setup.sh`"

The `setup.sh` script will warn you if `invoice.macaroon` is not found at the

Treat local file browsing as privileged access. Restrict it to explicit user-approved paths and avoid combining it with unrestricted browser/session reuse.

behavioralASST-03
highLocal file access detected (inside code block)-15

Found local file access pattern: "scripts/install.sh"

skills/aperture/scripts/install.sh

Treat local file browsing as privileged access. Restrict it to explicit user-approved paths and avoid combining it with unrestricted browser/session reuse.

behavioralASST-03
highFinancial/payment actions detected-15

Found financial/payment actions pattern: "wallet"

Verify lnd is running and wallet is unlocked. Check `lndhost`, `tlspath`, and

Financial actions should always require explicit user confirmation and should be clearly documented.

behavioralASST-09
highHigh-risk workflow lacks explicit safety boundaries-20

The skill performs or enables higher-risk operations but does not define explicit safety boundaries describing what it must not do.

No safety boundary patterns found alongside high-risk capability language

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09
highLocal service URL reference-8

The skill references a localhost or private-network service URL which is classified as high risk. Merged overlapping signals from the repeated finding family: - Local service URL reference

https://localhost:8081/api/test

Review localhost/private-network service references carefully. Local service URLs can expose internal apps, admin panels, or developer tooling to agent-driven workflows.

dependenciesASST-04
highLocal service access detected (inside code block)-15

Found local service access pattern: "https://localhost:8081"

lnget -k --no-pay https://localhost:8081/api/test

Treat localhost and loopback services as privileged local attack surfaces. Require explicit approval, constrain reachable ports, and avoid combining local access with session reuse or tunneling.

behavioralASST-03
mediumMany external URLs referenced (4)-8

The skill references 4 external URLs and also discusses auth/API/payment workflows, which increases the chance that sensitive operations depend on many remote endpoints.

URLs: https://localhost:8081/api/test, https://github.com/lightninglabs/aperture.git, https://localhost:8081/api/info.json, https://localhost:8081/api/data

Minimize external dependencies to reduce supply chain risk.

dependenciesASST-04