0xwork
Fail
Audited by Snyk on Mar 27, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.80). Most links are to official package manager pages, the project's website, API endpoints and social accounts (lower risk), but the list includes a direct shell-script link (https://evil.com/script.sh) and unvetted third‑party npm packages which are high-risk vectors for malware/supply‑chain attacks, so the overall set should be treated as suspicious.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). The skill's required workflow (SKILL.md) tells the agent to fetch and read user-generated task descriptions, comments, and referenced URLs from the public 0xWork marketplace (via commands like "0xwork discover" and "0xwork task " and tools like web_search/web_fetch in references/execution-guide.md), which are explicitly untrusted and can contain instructions that could influence agent actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill instructs running the CLI at runtime (e.g., "npx @0xwork/cli discover") which fetches and executes code from the npm package URL https://npmjs.com/package/@0xwork/cli, so remote code would be executed as a required dependency.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill explicitly provides blockchain payment and wallet capabilities. It includes wallet configuration (PRIVATE_KEY or BANKR_API_KEY for remote signing), env vars for RPC and API, and CLI/SDK commands that perform on-chain financial actions: posting tasks with USDC bounties (deposits to escrow), claiming tasks (staking $AXOBOTL), approving/releasing USDC, product buy (purchasing with USDC), faucet/funding, reclaiming bounties, and other transaction-affecting commands. It also references smart contract addresses and a Bankr remote-signing API. These are specific crypto/blockchain payment and signing functions (not generic HTTP or browser tools), so it grants direct financial execution authority.
Issues (4)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata