x402storage
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (HIGH): The skill frequently invokes
npx -y @x402storage/mcp, which downloads and executes code from the npm registry. This package is not from a trusted organization, posing a significant supply chain risk. - [REMOTE_CODE_EXECUTION] (HIGH): Setup and wallet management flows (setup.md, switch-wallet.md) rely on downloading and running remote scripts via
npxat runtime. Examples:npx -y @x402storage/mcp --generate-evm-walletandclaude mcp add x402storage -- npx @x402storage/mcp. - [CREDENTIALS_UNSAFE] (MEDIUM): The skill explicitly reads the contents of
~/.x402-config.jsonviacatin setup.md and switch-wallet.md. This file contains wallet addresses and potentially sensitive session data. While the instructions tell the agent not to show private keys, the raw file access increases the risk of accidental exposure or exfiltration. - [COMMAND_EXECUTION] (MEDIUM): The skill executes various shell commands to modify the environment, including
mkdir -pandclaude mcp add. - [PROMPT_INJECTION] (LOW): Indirect Prompt Injection Surface detected in recall.md and fetch.md. 1. Ingestion points:
WebFetchtool retrieves external content fromhttps://x402.storage/{cid}. 2. Boundary markers: None; content is displayed directly to the agent. 3. Capability inventory: Skill has access to shell execution (npx) and file system writes. 4. Sanitization: No sanitization or safety filtering of retrieved content is specified.
Recommendations
- AI detected serious security threats
Audit Metadata