payram-self-hosted-payment-gateway

Warn

Audited by Socket on Feb 28, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

The fragment describes a comprehensive, self-hosted crypto payment gateway deployment with detailed wallet, contract, and SSL setup. While the stated purpose is legitimate (self-hosted, on-premises control), the workflow introduces multiple high-risk patterns: remote installer execution via curl | bash, direct handling of private keys and seed phrases within the setup flow, and reliance on external domains for installer delivery without explicit supply-chain protections. Data flows show sensitive credentials moving from user input to wallet configuration and then to the PayRam core services, creating significant risk in a compromised environment. Overall, the fragment is best categorized as SUSPICIOUS to HIGH RISK due to credential exposure points and download-execute patterns, but not definitively malicious in itself without evidence of harm or exfiltration. Recommend strict controls: verify installer signatures, prefer pinned/offline installers, avoid passing private keys in logs, enforce secret management and per-project isolation, and ensure zero-logging policies for sensitive data.

Confidence: 75%Severity: 75%
Audit Metadata
Analyzed At
Feb 28, 2026, 08:27 AM
Package URL
pkg:socket/skills-sh/payram%2Fpayram-mcp%2Fpayram-self-hosted-payment-gateway%2F@f9a0adc69eacfd03a9338efebc3c19b074f004e4