dc-bank
Warn
Audited by Snyk on Apr 24, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.70). The skill requires installing and running the external Membrane CLI (installed via "npm install -g @membranehq/cli"), which fetches and executes third-party code used at runtime to control integrations, so this external package is a runtime dependency that can execute remote code.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is an explicit DC Bank integration (a banking connector) that exposes bank-specific actions and a proxy to the DC Bank API via the Membrane CLI. The docs explicitly mention managing accounts and making transactions and show how to run connector actions (membrane action run --connectionId=... ACTION_ID) and to send proxied API requests with arbitrary HTTP methods (membrane request CONNECTION_ID /path -X POST/PUT/DELETE --json). Membrane also handles authentication/credential refresh, so the agent can perform authenticated banking operations. Because this is a dedicated banking API integration that enables sending transactions and other state-changing calls, it constitutes direct financial execution capability.
Issues (2)
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata