Nano Wallet Operations
Fail
Audited by Snyk on Mar 15, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The skill explicitly directs generating and printing seed phrases and hex seeds (including JSON outputs and commands that echo the seed/mnemonic), which requires the agent to include secret seed values verbatim in its output and thus presents a direct exfiltration risk.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill repeatedly runs the CLI package via npx (e.g.,
npx -y xno-skills), which fetches and executes remote code from the npm registry (e.g., https://registry.npmjs.org/xno-skills or https://www.npmjs.com/package/xno-skills) at runtime, so the fetched content directly controls execution.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly a crypto wallet tool: it creates/restores Nano (XNO) wallets, outputs 24-word BIP-39 seed phrases and hex seeds, and provides programmatic functions to derive addresses. Exposing and generating private seeds/mnemonics is a direct crypto wallet capability (gives authority to control and move funds), so this is a specific financial/crypto operation rather than a generic tool.
Issues (3)
W007
HIGHInsecure credential handling detected in skill instructions.
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata