create-python-x402-client

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill wraps httpx/requests (x402HttpxClient, x402_requests, wrapHttpxWithPayment/wrapRequestsWithPayment) and explicitly performs client.get(resource_url) to arbitrary external URLs (e.g., "https://api.example.com/paid-resource") and parses 402 PaymentRequired data from response headers/body, so it fetches and interprets untrusted third-party content.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned the full prompt for literal, high-entropy values that could be usable credentials.

Findings:

  • The only high-entropy literal is in the config example:
  • network="algorand:SGO1GKSzyE7IEPItTxCByw9x8FmnrCDexi9/cOUJOiI=" This is a base64-like, random-looking string (prefixed with "algorand:") and therefore meets the "high-entropy literal" definition. It could be a network identifier or a secret token; because it is a concrete value (not a placeholder like YOUR_API_KEY) it should be treated as a potential secret and reviewed/rotated if it is in fact a live credential.

Ignored items (not flagged) and why:

  • AVM_PRIVATE_KEY is only referenced as an environment variable name and no literal private key value is present — ignore per rule 3 (env var names).
  • No sample Base64 private key or full PEM block appears in the doc. Code shows how to encode/decode keys, but does not contain an actual secret value.
  • Other strings (URLs, example simple passwords, package names, function names) are documentation/examples and/or low-entropy placeholders, so they are ignored per the given rules.

Recommendation: Verify whether the "algorand:SGO1GKSz..." value is an intentionally public identifier. If it is a secret or access token, remove and rotate it immediately; if it is a benign public ID, mark it as an example in docs to avoid confusion.


MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly designed to perform on-chain payments: it creates Algorand USDC payment transactions, constructs atomic transaction groups (ExactAvmScheme), and signs them using a provided Algorand private key via a ClientAvmSigner implementation. It requires an AVM_PRIVATE_KEY env var (Base64 64-byte secret), shows concrete signing code (using algosdk encoding and sign()), and wraps HTTP clients to automatically attach X-PAYMENT headers and retry after 402 responses. These are direct crypto wallet/payment operations (creating and signing transactions), so it grants direct financial execution capability.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 03:24 AM