checkout
Audited by Socket on Feb 27, 2026
1 alert found:
SecurityFunctionally the skill is coherent: collecting product details, returning a quote, requiring an off-chain x402 payment payload, submitting a checkout, and polling for completion are consistent with a payment/checkout aggregator. The primary security concern is that all PII and payment payloads are sent to a third-party domain (checkout-agent.credpay.xyz). That design is plausible for a payment aggregator, but it concentrates sensitive data and payment credentials in a single external service and therefore requires out-of-band trust validation (who operates the domain, what data retention and security practices exist). There is also ambiguity about how the x402 payment payload is generated/stored and whether user private keys are ever exposed to the agent. No direct signs of obfuscation, remote code execution, or download-execute supply chain patterns appear in the provided skill text. Overall this is a functional but moderately risky integration that should be treated as suspicious until the endpoint/operator is validated and clear secure handling of payment payloads is explained.