mcp-payment-pix

Fail

Audited by Snyk on Feb 28, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The prompt shows examples embedding access tokens directly into MCP configuration and command arguments (env values and an Authorization header), which encourages placing secret values verbatim into generated configs/commands.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The skill's MCP setup runs remote code at runtime via "npx -y kobana-mcp-payment" (which fetches and executes the kobana-mcp-payment package) and also supports a remote MCP endpoint ("https://mcp.kobana.com.br/payment/mcp") that the agent connects to to receive tool behaviors, so external content is fetched/executed and controls the agent's runtime tools.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly designed to perform real payments via the kobana-mcp-payment MCP server. It exposes targeted financial actions: create_payment_pix, create_payment_pix_batch, approve_payment_batch, cancel_payment_pix, list_financial_accounts, get_financial_account, etc. These are bank/payment operations (Pix payments, batching and approval) that directly move or authorize transfer of funds—not generic HTTP or browser tooling. This matches the “banking APIs / payment gateway” category and therefore grants Direct Financial Execution capability.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 28, 2026, 10:05 PM