a2a-setup

Fail

Audited by Snyk on Mar 8, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The prompt shows generating and embedding bearer tokens into configuration/peer JSON and passing tokens to CLI scripts (e.g., --token, openclaw config set ... "$TOKEN"), which means an agent automating these steps would need to accept and output secret values verbatim, creating exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). This skill explicitly fetches and auto-discovers peer Agent Cards and messages remote agents (e.g., scripts/a2a-send.mjs and the curl checks that retrieve http://<PEER_IP>:18800/.well-known/agent-card.json, and the TOOLS.md instructs the agent to run the script), so it ingests untrusted third‑party agent responses that can influence tool use and next actions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt instructs running privileged installation commands (curl ... | sh) and explicitly uses "sudo tailscale up", and it modifies system/network and service configuration of the running server (installing plugins, changing OpenClaw config, restarting gateway), which requires or encourages elevated privileges and can alter machine state.
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 8, 2026, 03:12 AM