compressed-nfts-basics

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The prompt includes code that takes API keys and secret key material (e.g., heliusApiKey in fetch URLs and payer.secretKey used to create signers) and embeds them directly into requests/code, which encourages the model to handle or output secret values verbatim.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). Yes — the skill calls public indexer APIs (e.g., Helius DAS RPC at https://mainnet.helius-rpc.com) and consumes asset proofs and metadata (including Arweave/IPFS URIs) returned by those third‑party services as part of mint/transfer/query workflows, so it ingests untrusted, user-generated content.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly designed to create, mint, and transfer Solana compressed NFTs and contains concrete crypto/blockchain transaction operations and signing flows. It includes code that constructs signers from Keypairs (createSignerFromKeypair, generateSigner), calls transaction-producing APIs (createTree, mintV1, transfer) and uses .sendAndConfirm to submit signed transactions, plus direct RPC calls to Helius. These are specific crypto/blockchain functions that perform on-chain asset minting and transfers (i.e., moving value/ownership). Therefore it grants direct financial execution capability.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 01:54 AM