payments
Pass
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- [PROMPT_INJECTION]: Indirect prompt injection surface identified in the dynamic pricing implementation. 1. Ingestion points: The
resolvePricefunction inreferences/server-setup.mdingestsrequest.paramsfrom client calls. 2. Boundary markers: Not present in the provided code examples to delineate user-supplied parameters from logic. 3. Capability inventory: The logic controls the amount to be charged and determines if a request is permitted to proceed to the underlying tool. 4. Sanitization: The examples do not demonstrate sanitization of the input parameters before they are used for price calculation or description generation. - [CREDENTIALS_UNSAFE]: Best practices for secret management are observed throughout the documentation. Code examples use environment variables (e.g.,
NWC_SERVER_CONNECTION,LNBITS_INVOICE_KEY,LNBITS_ADMIN_KEY) to handle sensitive connection strings and API keys. - [EXTERNAL_DOWNLOADS]: The skill integrates with the
@contextvm/sdkpackage. This is a vendor-owned resource used for implementing the payment rails and middleware described in the skill.
Audit Metadata