drop-in-ui
Warn
Audited by Snyk on Apr 21, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill includes and requires the remote runtime script https://hit-pay.com/hitpay.js (and its sandbox https://sandbox.hit-pay.com/hitpay.js), which is fetched and executed in the client's browser at runtime and therefore executes remote code that controls the agent's payment UI behavior.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly a payment integration for HitPay: it shows server-side calls to HitPay's payment-requests API (POST to /v1/payment-requests with an X-BUSINESS-API-KEY), returns a payment URL, and uses HitPay.js (HitPay.init and HitPay.toggle) to launch an embedded checkout and complete payments. This is a specific payment-gateway integration intended to create and process transactions (i.e., move money), not a generic tool, so it grants direct financial execution capability.
Issues (2)
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata