authenticate-wallet

Fail

Audited by Snyk on Apr 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The skill requires embedding one-time passwords verbatim in CLI commands (e.g., auth verify and the example with "123456"), forcing the agent to emit secret OTP values in output—private keys are at least restricted to an interactive prompt, but the OTP flow still creates direct secret-handling risk.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill repeatedly requires running "npx fibx@latest" (i.e., fetching the fibx package from the npm registry at runtime), which downloads and executes remote code that the skill relies on for authentication, so external content is executed during runtime.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly for a crypto wallet: it handles wallet authentication, including private key import (local wallet) and Privy-based sessions, and is required before wallet operations like balance, send, trade, and Aave interactions. It therefore directly enables crypto/blockchain financial operations (wallet access and signing capability). Even if it doesn't itself issue a "send" command, it is specifically designed to grant/restore control of a wallet (private key import, session tokens), which is a direct crypto financial execution capability.

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
HIGH
Analyzed
Apr 16, 2026, 08:57 AM
Issues
3