paystand
Warn
Audited by Snyk on Apr 22, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.70). The skill invokes the Membrane CLI (e.g., "npm install -g @membranehq/cli" and particularly "npx @membranehq/cli@latest ..."), which fetches and executes code from the npm registry at runtime and is a required dependency for the skill to operate.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). Yes. This skill explicitly integrates with Paystand, a payments platform, and exposes payment-related resources (Payment, Transaction, Payout Account, Payment Method, Refund). It uses the Membrane CLI to run connector "actions" and proxy arbitrary API requests (including POST/PUT/DELETE) to the Paystand API while handling auth. Those actions and proxied endpoints are specifically intended for creating payments, refunds, payouts, and related financial operations — i.e., moving money. This matches the “Payment Gateways / Crypto / Banking APIs / Market Orders / Ad-budget updates” category, so it constitutes direct financial execution capability.
Issues (2)
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata