paystand

Warn

Audited by Snyk on Apr 22, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.70). The skill invokes the Membrane CLI (e.g., "npm install -g @membranehq/cli" and particularly "npx @membranehq/cli@latest ..."), which fetches and executes code from the npm registry at runtime and is a required dependency for the skill to operate.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). Yes. This skill explicitly integrates with Paystand, a payments platform, and exposes payment-related resources (Payment, Transaction, Payout Account, Payment Method, Refund). It uses the Membrane CLI to run connector "actions" and proxy arbitrary API requests (including POST/PUT/DELETE) to the Paystand API while handling auth. Those actions and proxied endpoints are specifically intended for creating payments, refunds, payouts, and related financial operations — i.e., moving money. This matches the “Payment Gateways / Crypto / Banking APIs / Market Orders / Ad-budget updates” category, so it constitutes direct financial execution capability.

Issues (2)

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 22, 2026, 11:48 PM
Issues
2