aomi-transact
Fail
Audited by Snyk on May 8, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The skill explicitly permits running credential-persisting commands (e.g.,
aomi secret add NAME=value,aomi wallet set <key>,--api-keyflags) when the user supplies the secret in-turn, which requires the LLM to embed the secret verbatim into generated command output and thus creates an exfiltration risk.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill explicitly invokes external data sources (e.g., the "default" app's brave_search in references/apps.md and social apps like
xandneynar) and the agent is expected to ingest and act on those third‑party/web/social results (quotes, routes, posts) as part of building/simulating/signing transactions, so untrusted user-generated content can materially influence tool decisions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill explicitly invokes the Aomi CLI via on-demand fetching/execution (e.g., "npx @aomi-labs/client", which pulls package code from the npm registry such as https://registry.npmjs.org/@aomi-labs/client) so remote code is fetched and executed at runtime and is a required dependency for the skill to operate.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly designed for blockchain financial operations: it exposes commands to build, simulate, sign, and submit on-chain transactions (aomi tx list, aomi tx simulate, aomi tx sign), supports EIP-712 payloads, account-abstraction signing flows, wallet configuration (aomi wallet set), and secret ingestion for signing keys. These are concrete crypto/wallet signing and broadcast capabilities (not generic tooling), so it grants direct financial execution authority.
Issues (4)
W007
HIGHInsecure credential handling detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata