vara-eth-app-builder

Fail

Audited by Snyk on May 6, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The skill explicitly shows a CLI pattern that passes a private key as a command-line argument (ethexe key keyring import --private-key ...), and it instructs keeping private-key placeholders explicit, which encourages embedding secrets verbatim in generated commands and thus poses an exfiltration risk.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill explicitly describes blockchain transaction and wallet operations: importing a sender private key via ethexe, running transactions with --ethereum-rpc/--ethereum-router and --sender, uploading code, creating programs, topping up executable/native/wVARA balances, initializing programs, and calling ABI/ethereum transactions. It references specific crypto tooling (ethexe CLI, Solidity ABI, Vara.eth, wVARA) and procedures that send funds/state-changing transactions and require signing keys. These are explicit crypto/financial execution capabilities (wallet management, signing, sending funds/transactions), so it meets the Direct Financial Execution definition.

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
HIGH
Analyzed
May 6, 2026, 02:23 PM
Issues
3