pay-for-service
Warn
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Unverifiable Dependencies & Remote Code Execution (MEDIUM): The skill relies on
npx awal@latestto perform core functions.npxdownloads and executes code from the npm registry at runtime. Theawalpackage is not provided by a trusted organization (as defined in the analysis guidelines), posing a risk of supply chain attacks or malicious code updates being executed by the agent. - Command Execution (LOW): The skill is designed to execute bash commands via
npx. While the allowed-tools are restricted to theawalCLI, vulnerabilities in the CLI's argument parsing or the package's logic could be exploited. - Indirect Prompt Injection (LOW):
- Ingestion points: The
x402 paycommand fetches data from external, potentially attacker-controlled URLs. - Boundary markers: Absent; there are no delimiters or explicit instructions for the agent to ignore instructions embedded in the API responses.
- Capability inventory: The agent has the ability to execute bash commands, manage wallet balances, and interact with network endpoints.
- Sanitization: Absent; output from external service calls is processed without visible sanitization or validation filters.
Audit Metadata