pay-for-service
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- EXTERNAL_DOWNLOADS (MEDIUM): The skill utilizes
npx awal@latest, which dynamically downloads and executes the 'awal' package from the npm registry. Because 'awal' is not a recognized trusted source and the skill uses the@latesttag, the behavior of the code could change at any time without verification. - REMOTE_CODE_EXECUTION (MEDIUM): The use of
npxto run an unverified third-party package constitutes remote code execution. Since the package source is not within a trusted organization or repository, the security of the script cannot be guaranteed at runtime. - DATA_EXFILTRATION (LOW): The
x402 paycommand is designed to send headers and data to arbitrary URLs. While this is the primary intended function of the skill, it creates a surface for data exfiltration if the agent is prompted to send sensitive local data or environment variables to an attacker-controlled endpoint. - Indirect Prompt Injection (LOW):
- Ingestion points: The response from the paid API request (output of the
awalcommand) is returned to the agent context. - Boundary markers: Absent; there are no instructions to the agent to treat the API response as untrusted data.
- Capability inventory: The skill allows full
Bashcommand execution for theawalCLI, providing a path for subsequent malicious actions if the API response contains instructions. - Sanitization: None; the raw output from the external service is processed by the model.
Audit Metadata