xmtp-agent
Warn
Audited by Socket on Mar 6, 2026
1 alert found:
AnomalyAnomalySKILL.md
LOWAnomalyLOW
SKILL.md
The bridge design is coherent and aligns with the stated goal of connecting an external agent to XMTP, offering owner/public separation and per-conversation contexts. However, the access control relies on non-cryptographic ID-based gating, and the use of a mutable public prompt introduces prompt-injection risk if not properly sandboxed. The reliance on external backends and filesystem prompts broadens the attack surface. Overall, the approach is plausible but warrants careful hardening of access controls, explicit input validation, sandboxing of backends, and auditing of prompt-injection risks; treat as a moderate-to-high security risk without strong cryptographic access enforcement.
Confidence: 65%Severity: 60%
Audit Metadata