stripe-one-time-payment

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.80). The prompt includes commands that place secret keys/tokens directly on the command line (e.g., printf "YOUR_SECRET_KEY" | vercel env add ... and use of $VERCEL_TOKEN), which encourages embedding secrets verbatim in generated commands and thus creates an exfiltration risk.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly a Stripe Checkout integration for accepting one-time payments. It requires STRIPE_SECRET_KEY and STRIPE_PUBLISHABLE_KEY, includes endpoints like create-checkout-session, auto-creates products, provides test card numbers, and contains deploy instructions to live keys—i.e., it is specifically designed to initiate and process payments via a payment gateway. This is direct financial execution capability (Stripe).
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 09:29 PM