publisher profilecommunity

tracsystems

tracsystems publishes 7 tracked skills in DriftBot.

Catalog decision: Review-first publisher: this catalog currently carries failed runtime rows or high-risk labels, so inspect individual skills before trusting the brand halo.
7
indexed skills
43
average score
0
manual reviews
2
high-risk labels
catalog evidence snapshotbaseline-v3 coverage 2/7no functionality-v2 receipts yetno manual reviews yet2 high-risk labels
Read this row as a catalog snapshot: runtime coverage, deeper follow-on coverage, human review presence, and high-risk concentration before you compare individual skills.

📊 Runtime quality summary

Runtime read: stronger publisher evidence means more than broad coverage — look for low current failure pressure, some functionality depth, and stale-runtime counts that stay under control.
eligible runtime skills: 7latest touch: 24h agono current regressions
Baseline coverage
229% of eligible skills have baseline-v3 receipts
Baseline pass rate
100%2 passed · 0 currently failing
Functionality coverage
00% of baseline-cleared skills have functionality-v2
Fixture-backed rate
0%0 functionality-v2 rows have richer fixture/example proof
Stale baseline rows
0baseline receipts older than 7 days
Functionality failures
0current failed functionality-v2 rows in the latest publisher state

This is the quality surface for the publisher, not just a directory listing. It shows how much of the catalog has real receipts, how often those receipts are passing, whether richer fixture-backed proof exists, and whether the publisher currently carries regressions, reproduced failures, or stale runtime evidence.

Latest runtime touch: 2026-03-15 00:15 UTC. Publisher-level summaries do not replace skill-level review, but they do make reputation more earned: a publisher with broader coverage, stronger pass rates, and fixture-backed proof looks different from one living on thin smoke tests.

If you want the system-wide view, open the runtime dashboard. If you want the scoring logic, read the methodology.

Skills from this publisher

Showing 7 of 7 skills

Label mix on this page

Trusted: 0Use Caution: 0Insufficient Evidence: 5High Risk: 2

This distribution is a quick provenance cue, not a verdict. A publisher can have a mix of safer and riskier skills, so the useful move is to compare patterns here and then open the individual scorecards.

Publisher profiles are best for spotting catalog patterns: repeated shell access, common external services, whether manual review exists, and whether higher-risk labels are isolated or widespread.

On this page: 7 source-scanned, 0 catalog-only, and 0 manually reviewed entries in the current slice.

If you want the scoring logic, read the methodology. If you want the broader landscape, go back to the full index.

intercom-competision

tracsystems · vsource-scanned
51
overall

Vibe competition for Intercom: build a new app on Intercom, publish it on Moltbook, and earn TNK rewards.

Insufficient Evidenceconfidence: source evidencesource-scanned
+ 1 more
privileged capability
Take: Source-aware scan found higher-privilege capability areas (wallet), but that alone is not evidence of malicious behavior.
Decision cue: Decent evidence base — source-level signals are available, so inspect the receipts.

agent-takeover

tracsystems · vsource-scanned
50
overall

How to perform a live agent takeover of the Clawfinger voice gateway — dial, inject greetings, handle turns, release, and observe handback. Covers timing, endpoints, the WebSocket protocol, and includes a human-guided test case.

Insufficient Evidenceconfidence: source evidencesource-scanned
+ 1 more
privileged capability
Take: Source-aware scan found normal operational surface via environment, network, or shell-related references.
Decision cue: Decent evidence base — source-level signals are available, so inspect the receipts.

intercom-lightning

tracsystems · vsource-scanned
46
overall

IntercomSwap (OpenClaw-hardened): operator-run, manual-only P2P RFQ swaps that negotiate over Intercom sidechannels and settle BTC (Lightning) <-> USDT (Solana) via an escrow program. High-risk financial operations; require explicit human approval for any fund-moving action.

Insufficient Evidenceconfidence: source evidencesource-scanned
+ 1 more
privileged capability
Take: Source-aware scan found higher-privilege capability areas (wallet), but that alone is not evidence of malicious behavior.
Decision cue: Decent evidence base — source-level signals are available, so inspect the receipts.

the-next-big-thing

tracsystems · vsource-scanned
44
overall

Programmatic participation in The Next Big Thing without a browser: connect/sign via Tap Wallet, deploy tokens with dta elevator pitch, post shills/comments, request mint grants, react to posts, and generate share links via existing API endpoints.

Insufficient Evidenceconfidence: source evidencesource-scanned
+ 1 more
privileged capability
Take: Source-aware scan found higher-privilege capability areas (wallet, token), but that alone is not evidence of malicious behavior.
Decision cue: Decent evidence base — source-level signals are available, so inspect the receipts.

thenextbigthing

tracsystems · vsource-scanned
44
overall

Programmatic participation in The Next Big Thing without a browser: connect/sign via Tap Wallet, deploy tokens with dta elevator pitch, post shills/comments, request mint grants, react to posts, and generate share links via existing API endpoints.

Insufficient Evidenceconfidence: source evidencesource-scanned
+ 1 more
privileged capability
Take: Source-aware scan found higher-privilege capability areas (wallet, token), but that alone is not evidence of malicious behavior.
Decision cue: Decent evidence base — source-level signals are available, so inspect the receipts.

intercom

tracsystems · vsource-scanned
35
overall

Operate a local Intercom peer (Pear) for P2P agent messaging (sidechannels) + optional contract state. Uses SC-Bridge WebSocket for agent I/O. No installers or remote scripts.

High Riskbaseline safety checks passed · 8/8confidence: source evidence
+ 2 more
source-scannedsuspicious
Runtime receipts + what passed2026-03-14 21:30 UTC
baseline-v3evidence depth: baseline checks onlytested recently: within 7 dayspassedoutput 245 Bartifacts 2worker oc-sandboxsource stage: fresh copysuite 2252 ms
RatioDaemon on this skillIntercom is built for intercom. Baseline-v3 currently passes, the trust label is High Risk, and setup looks advanced.
Observed: 2 /workspace/source-files.txt
Take: Potentially suspicious implementation signals detected: password.
Decision cue: Proceed carefully — suspicious signals matter more than capability surface alone.

intercom-v002

tracsystems · vsource-scanned
31
overall

Skill for autonomous agents. Secure & private P2P messaging (sidechannels), sparse state/data + contracts, and optional value transfer. For a true agentic internet.

High Riskbaseline safety checks passed · 8/8confidence: source evidence
+ 2 more
source-scannedsuspicious
Runtime receipts + what passed2026-03-15 00:15 UTC
baseline-v3evidence depth: baseline checks onlytested recently: within 7 dayspassedoutput 245 Bartifacts 2worker oc-sandboxsource stage: fresh copysuite 2351 ms
RatioDaemon on this skillIntercom V002 is trying to handle skill for autonomous agents. Baseline-v3 currently passes, the trust label is High Risk, and setup looks advanced.
Observed: 2 /workspace/source-files.txt
Take: Potentially suspicious implementation signals detected: rm -rf, sudo .
Decision cue: Proceed carefully — suspicious signals matter more than capability surface alone.
Page 1 / 1

Trust reading guide

Publisher-level summaries help with provenance context, but trust still lives at the skill level. Use this page to compare patterns across the publisher’s catalog, then inspect the raw findings on individual skill pages.

Back to the full index