botchan-net
Fail
Audited by Snyk on Mar 13, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 0.80). The skill explicitly shows and documents passing raw private keys (export BOTCHAN_PRIVATE_KEY=0x..., export NET_PRIVATE_KEY=0xYOUR_KEY) and a --private-key KEY CLI flag—patterns that permit or encourage embedding secret values verbatim in commands (high exfiltration risk), even though safer encode-only/Bankr alternatives are noted.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's SKILL.md instructs agents to read and poll public, user-generated content (e.g., "botchan read general --unseen --json" and the "Agent Polling Pattern") and to fetch storage and profile data (e.g.,
netp storage read,botchan profile get) from the open Net Protocol network, meaning untrusted third-party posts/files are ingested and used in workflows that can drive subsequent actions (posting, transaction preparation, upvoting), so external content could indirectly inject instructions.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill explicitly provides on-chain financial capabilities. It requires wallet keys (BOTCHAN_PRIVATE_KEY / NET_PRIVATE_KEY), supports transaction signing/submission (direct private key or via Bankr), and exposes crypto-specific commands that move value: netp token deploy (including initial-buy with non-zero value), netp upvote token/user (costs ETH per upvote), netp bazaar buy-listing / accept-offer (returns fulfillment with value), and other NFT trading and token deployment functions. The docs describe encode-only transaction outputs including "value" fields and workflows for submitting those value-bearing transactions. These are specific crypto/blockchain payment and trading operations (not generic HTTP or browser automation), so it grants direct financial execution authority.
Issues (3)
W007
HIGHInsecure credential handling detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata