mezo

Warn

Audited by Snyk on Mar 3, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly instructs the agent to fetch and act on public third‑party content — e.g., scripts/check-rpc.sh posts to public RPC URLs (references/network-and-env.md lists multiple public RPC endpoints) and references/mezod-and-validator-kit.md shows cloning GitHub repos — so responses from those external sources are read and used to make decisions and drive tool actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.80). The skill's mezod quickstart explicitly runs a runtime git clone and build sequence—"git clone https://github.com/mezo-org/mezod.git" followed by go mod download / make build / make dev—so the URL https://github.com/mezo-org/mezod.git is a runtime-fetched dependency whose code is compiled/executed locally.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill explicitly defines blockchain transaction workflows and wallet interactions that move value: Mezo Passport wallet connection, deploying contracts with a configured signer/provider, Mezo Earn automation (veBTC lock lifecycle, gauge voting, rewards claims, incentive posting), and epoch-aware automation for vote/poke/claim actions. It targets mainnet/testnet, confirms transactions on explorers, and includes node/operator and validator onboarding commands. These are specific crypto/blockchain financial operations (wallets, signing, claims, posting incentives) — not generic tooling — so it grants direct financial execution capability.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 3, 2026, 06:40 PM