x402-on-skale

Warn

Audited by Snyk on Mar 23, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's agent client code (see SKILL.md and examples/complete-setup.md) calls fetch(url) on arbitrary endpoints (e.g., "https://api.example.com/api/data"), reads response.json() and response headers to parse payment challenges via httpClient.getPaymentRequiredResponse, and then uses that untrusted third‑party response to construct payment headers and drive follow-up requests, so external content can materially influence agent actions.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). Yes. The skill explicitly implements crypto payment functionality: it defines payment middleware with payTo addresses and token contract addresses, includes network IDs for SKALE, references ERC-3009 (TransferWithAuthorization), and provides client/server APIs (HTTPFacilitatorClient, x402HTTPClient, x402Client, ExactEvmScheme) to create payment payloads, sign them using a private key (privateKeyToAccount), encode payment signature headers, and perform agent-to-agent/autonomous payments. These are specific, purpose-built blockchain payment operations (wallet signing and transaction/payment submission), not generic I/O — therefore it grants Direct Financial Execution capability.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 23, 2026, 02:24 PM
Issues
2