setup-stylus-contracts
Warn
Audited by Snyk on Mar 5, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). The skill's required workflow explicitly tells the user/agent to fetch or consult open public sources—e.g., running curl against https://sh.rustup.rs and checking the rust-contracts-stylus GitHub repo and crates.io (https://crates.io/crates/openzeppelin-stylus) for current versions—which are untrusted third‑party pages whose content could be read and then influence versioning/build/deploy actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill includes a runtime installation command "curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh" which fetches and executes a remote script from https://sh.rustup.rs, making it a required external dependency that executes remote code.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly for building and deploying Stylus smart contracts on Arbitrum and includes commands that perform blockchain transactions and signing (notably
cargo stylus deploy --endpoint="<RPC_URL>" --private-key-path="<KEY_FILE>"). It references token/finance modules and use of a private key for deployment, which are specific crypto/blockchain operations (wallet signing / transaction submission). This meets the "Crypto/Blockchain (Wallets, Swaps, Signing)" criteria for Direct Financial Execution.
Audit Metadata