checkout

Warn

Audited by Socket on Feb 27, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

Functionally the skill is coherent: collecting product details, returning a quote, requiring an off-chain x402 payment payload, submitting a checkout, and polling for completion are consistent with a payment/checkout aggregator. The primary security concern is that all PII and payment payloads are sent to a third-party domain (checkout-agent.credpay.xyz). That design is plausible for a payment aggregator, but it concentrates sensitive data and payment credentials in a single external service and therefore requires out-of-band trust validation (who operates the domain, what data retention and security practices exist). There is also ambiguity about how the x402 payment payload is generated/stored and whether user private keys are ever exposed to the agent. No direct signs of obfuscation, remote code execution, or download-execute supply chain patterns appear in the provided skill text. Overall this is a functional but moderately risky integration that should be treated as suspicious until the endpoint/operator is validated and clear secure handling of payment payloads is explained.

Confidence: 80%Severity: 75%
Audit Metadata
Analyzed At
Feb 27, 2026, 04:33 PM
Package URL
pkg:socket/skills-sh/credpay-app%2Fshop%2Fcheckout%2F@f6bff585eb2cc697f08c2b23fed84dd8067e8f74