Scan Report
45 /100
authenticate-wallet
Authenticate to AgnicPay wallet using browser OAuth or non-browser API token mode
The skill relies on unversioned npx execution of external npm package with wildcard arguments, posing significant supply chain risk.
Use with caution
Pin the npm package to a specific version hash and restrict allowed-tools to documented subcommands only.
Attack Chain 3 steps
⬡
Escalation Attacker typosquats or compromises 'agnic' npm package
SKILL.md:8⬡
Escalation Skill executes arbitrary code via 'npx agnic@latest *' when user invokes
SKILL.md:8◉
Impact Malicious package executes code with same shell:WRITE privileges
SKILL.md:8Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| High | Unversioned npm package execution Supply Chain | SKILL.md:8 |
| Medium | Wildcard allows undocumented subcommands Doc Mismatch | SKILL.md:8 |
| Low | Token visible in command line Credential Theft | SKILL.md:11 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | WRITE | WRITE | ✓ Aligned | allowed-tools declares Bash(npx agnic@latest *) |
File Tree
1 files · 1.5 KB · 62 lines Markdown 1f · 62L
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
agnic | @latest | npm | No | No version pinned; arbitrary code execution possible if package compromised |
Security Positives
✓ Skill is simple with minimal attack surface
✓ No hidden functionality detected
✓ No direct access to sensitive files (~/.ssh, ~/.aws, etc.)
✓ No base64 or obfuscated code
✓ No credential exfiltration observed