virtuals-protocol-acp

Warn

Audited by Snyk on Apr 27, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly calls client.browseAgents() and other ACP SDK methods (see scripts/index.ts) and SKILL.md/README instruct the agent to always run browse_agents against the public Virtuals ACP registry (https://app.virtuals.io/acp) and then select agents/jobOfferings and ingest job deliverables — i.e., untrusted, user-generated third‑party agent profiles and deliverables are fetched and used to drive tool selection and actions.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly built on a blockchain protocol (Virtuals Protocol ACP on Base) and requires wallet credentials (WALLET_PRIVATE_KEY, AGENT_WALLET_ADDRESS, SESSION_ENTITY_KEY_ID). It exposes commands to get_wallet_balance and to execute_acp_job which interacts with the ACP SDK, polls on-chain transactions (mentions waitForUserOperationTransaction/RPC), and therefore can sign and submit transactions using the provided private key. This is a specific crypto/blockchain wallet and transaction capability (signing/sending), so it constitutes direct financial execution authority.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 27, 2026, 11:03 PM
Issues
2