agent-payments
Fail
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Downloads an installation script for the 'presto' CLI tool from an external domain (
https://presto-binaries.tempo.xyz/install.sh). - [REMOTE_CODE_EXECUTION]: Uses the dangerous
curl | bashpattern to install the 'presto' utility, which executes remote code without any verification or integrity checks. - [COMMAND_EXECUTION]: Invokes
npxto dynamically fetch and execute theawalpackage, allowing unverified third-party code to run in the environment. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted data from the Codex Supergraph GraphQL API.
- Ingestion points: GraphQL query responses from
https://graph.codex.io/graphql(found inSKILL.md). - Boundary markers: Absent; the skill does not use delimiters or instructions to ignore embedded commands in the API response.
- Capability inventory: Includes shell command execution via
curl,npx, and theprestoCLI (found inreferences/wallets.md). - Sanitization: No evidence of sanitization or validation of the data received from the external API before it is processed.
Recommendations
- AI detected serious security threats
Audit Metadata