NYC

ens-primary-name

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.90). The ENS links and example images are legitimate/benign, but the skill instructs installing and executing a wallet-related "bankr" tool from an unvetted GitHub repository (https://github.com/BankrBot/openclaw-skills) and running shell scripts that sign transactions — executing unreviewed code that can access private keys is high risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill fetches and parses user-controlled ENS data from public third-party endpoints (notably the Graph subgraph at https://api.thegraph.com/subgraphs/name/ensdomains/ens and public RPC endpoints) and decodes/prints resolver, resolvedAddress, reverse name and avatar URLs as part of its workflow, so untrusted/user-generated content is ingested and interpreted.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill explicitly requires transaction signing and submission via a wallet API (the "bankr" skill / Bankr API) and shows concrete examples of calling bankr.sh with a transaction JSON (to, data, value, chainId). It encodes and sends on-chain transactions (across Base/Arbitrum/Optimism/Ethereum) and instructs how to replace the signer with other wallet tooling. This is explicit crypto/blockchain signing/submission capability — i.e., direct ability to execute on-chain transactions — which falls under Direct Financial Execution.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 10:54 AM