x402
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill utilizes
npx awal@latest, which fetches the latest version of the 'awal' package from the npm registry at runtime. This package is not from a trusted source. - [REMOTE_CODE_EXECUTION] (MEDIUM): Executing an unpinned package from an untrusted source via
npxconstitutes remote code execution, as the package content can be updated at any time. - [COMMAND_EXECUTION] (MEDIUM): The skill executes shell commands that handle authentication (
awal auth login) and interact with the local filesystem at~/.config/awal/. - [DATA_EXFILTRATION] (LOW): The
paycommand sends data and custom headers to arbitrary external URLs, which could be used to transmit sensitive information to third parties. - [PROMPT_INJECTION] (LOW): The skill is susceptible to indirect prompt injection by ingesting untrusted data from the 'bazaar' or arbitrary API endpoints. Evidence Chain: 1. Ingestion points:
awal x402 detailsandsearchresults. 2. Boundary markers: Absent. 3. Capability inventory: Shell execution (npx) and network requests. 4. Sanitization: No sanitization of external schemas or descriptions is performed before presenting to the agent.
Audit Metadata