near-kit

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes examples that hard-code private keys and seed phrases (e.g., privateKey: "ed25519:...", seed phrases), which instructs embedding secrets directly in generated code/config and could require the LLM to output secret values verbatim.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill calls and reads arbitrary on-chain contract data (e.g., near.view("contract.near", ...), useView hooks, and the untyped guestbook contract examples like guestbook.near-examples.testnet), which are public, user-generated contents on the NEAR blockchain that the agent is expected to read/interpret and therefore could carry untrusted/indirect prompt injection.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is a TypeScript library for NEAR Protocol with explicit, built-in crypto/financial operations: sending NEAR tokens (near.send("bob.near","5 NEAR")), calling contract methods with attached deposits, building and sending transactions (.transaction(...).transfer(...).send()), managing private keys/key stores, wallet integrations, and message signing. These are specific blockchain payment and signing primitives (wallets, keys, transactions) that enable direct movement of funds and signed transactions.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 09:38 AM