cryptorefills-x402
Warn
Audited by Snyk on May 9, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill explicitly fetches and decodes live responses from external hosts (e.g., GET /v1/brands, GET /v1/catalog and the Phase‑1 POST /v1/orders that returns the PAYMENT-REQUIRED header and references /.well-known/x402.json on x402.cryptorefills.com and solana.x402.cryptorefills.com), and those untrusted third‑party fields (payTo, extra.feePayer, maxAmountRequired, payload.transaction, etc.) are parsed and acted on to construct/sign payments, so remote content can directly change the agent's actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill issues runtime requests to https://x402.cryptorefills.com (and the Solana-hosted https://solana.x402.cryptorefills.com) to retrieve PAYMENT-REQUIRED headers (base64url JSON) that directly instruct the agent how to build/sign transactions and must be fetched to complete Phase 2, so these endpoints are runtime external dependencies that directly control agent actions.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly a payment-execution integration for crypto rails (Base EVM USDC and Solana USDC SPL). It details end-to-end steps to move funds: create a Phase-1 order to receive PAYMENT-REQUIRED, verify amounts, build EIP-712 / EIP-3009 authorizations for USDC on Base, or construct and partial-sign Solana v0 transactions (TransferChecked) against a USDC mint, then submit PAYMENT-SIGNATURE to settle the order. It names contract/mint addresses, signing primitives, nonce/expiry rules, exact transaction instruction shapes, and HTTP endpoints to submit signed payments. This is not a generic API caller or browser automation—its primary and explicit purpose is to authorize and execute crypto payments, i.e. direct financial execution.
Issues (3)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata