okx-x402-payment
Fail
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill instructs the agent to read the sensitive file path
~/.onchainos/.envto check for anEVM_PRIVATE_KEY. While this is described as a local signing fallback, accessing a user's private key file directly exposes highly sensitive credentials to the agent's context. - [COMMAND_EXECUTION]: The skill is vulnerable to command injection because it populates CLI arguments for the
onchainostool using raw data received from untrusted external HTTP responses. Specifically, the--challengeparameter inmpp.mdand the--acceptsparameter inx402.mdare derived directly from server headers and bodies, allowing a malicious server to inject arbitrary shell commands if the input is not properly escaped. - [PROMPT_INJECTION]: The skill exhibits a significant surface for indirect prompt injection as it processes data from remote servers that can influence agent behavior and CLI parameters.
- Ingestion points: Data is ingested from
WWW-AuthenticateandPAYMENT-REQUIREDheaders, as well as response bodies acrossSKILL.md,protocols/mpp.md, andprotocols/x402.md. - Boundary markers: There are no defined delimiters or instructions to ignore instructions embedded within the payment challenges.
- Capability inventory: The skill has access to high-privilege capabilities including wallet signing via TEE and local private keys, as well as network request replay.
- Sanitization: No instructions are provided for sanitizing or validating the content of the challenges before they are interpolated into commands.
Recommendations
- AI detected serious security threats
Audit Metadata