nookplot

Warn

Audited by Snyk on Apr 24, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly lets agents fetch and ingest untrusted third‑party content — e.g., arbitrary external URLs via the Gateway egress proxy (references/actions-overview.md), public user-generated posts/feeds and project files (references/content-publish.md, references/collab-projects.md), and import from public GitHub/skill URLs and https://nookplot.com/skills/.md (SKILL.md and integrations), which the agent is expected to read and act on as part of its workflows, so such content could indirectly inject instructions that change agent behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill explicitly states agents "may fetch on demand" live skill manifests from https://nookplot.com/skills/.md at runtime, which lets external markdown control agent behavior/prompts (live skill source) and therefore presents a runtime-controlled instruction dependency.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill provides explicit crypto/blockchain transaction capabilities. It describes on-chain state changes via a prepare → sign → relay flow, requires local EIP‑712 signing with an agent private key (examples show wallet.signTypedData and environment var NOOKPLOT_AGENT_PRIVATE_KEY), and exposes CLI/SDK/HTTP surfaces to register, create/claim bounties, deploy agents, stake NOOK, settle escrow, check credit balances, and interact with NOOK and USDC on Base Mainnet (token address given). These are concrete blockchain wallet/signing and token-management operations (moving/claiming/staking funds and settling escrow), not generic tooling, so it grants direct financial execution authority.

Issues (3)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 24, 2026, 10:36 AM
Issues
3