๐Ÿ›ก๏ธ SafeAgentSkills

Atxp

ยท v0.1.0

Medium Risk

Agent wallet, identity, and paid tools in one package. Register an agent, fund it via Stripe or USDC, then use the balance for web search, AI image generation, AI video generation, AI music creation, X/Twitter search, email send/receive, and 100+ LLM models. The funding and identity layer for autonomous agents that need to spend money, send messages, or call paid APIs.

H:3 D:4 A:4 C:1

โš ๏ธ Hazard Flags

EXEC FS_READ_USER NET_EGRESS_ANY CREDS_ENV CREDS_FILES ACT_PURCHASE PI_WEB

๐Ÿ“‹ Capabilities

Execution

  • โœ… Shell execution
  • โŒ Code execution
  • โŒ Install dependencies
  • โŒ Persistence
  • Privilege: user

Filesystem

  • โŒ Read workspace
  • โŒ Write workspace
  • โœ… Read home
  • โŒ Write home
  • โŒ Read system
  • โŒ Delete

Network

  • Egress: any
  • โŒ Ingress

Credentials

  • โœ… Environment vars
  • โœ… Credential files
  • โŒ Browser data
  • โŒ Keychain

Actions

โŒ send messagesโŒ post publicโœ… purchaseโŒ transfer moneyโŒ deployโŒ delete external

๐Ÿ”’ Containment

Level: maximum

Required:
  • APPROVE_PURCHASE: Financial actions possible
  • SANDBOX_CONTAINER: Code execution capability
Recommended:
  • LOG_ACTIONS: Audit trail for all actions

โšก Risks

Social engineering indicators: SOCIAL_ENG_VAGUE_DESCRIPTION low

Mitigation: Provide clear, detailed description of skill functionality

Tool poisoning: hidden behaviors detected (MCP_TOOL_POISONING_SENSITIVE_DATA, MCP_TOOL_POISONING_REMOTE_STORAGE) high

Mitigation: Remove references to sensitive data collection.

Data exfiltration patterns: INSTRUCTED_SENSITIVE_SERVICE_ACCESS, MCP_EXFIL_CONVERSATION high

Mitigation: Clearly document which sensitive services are accessed and why; use minimal required permissions

Want a deeper analysis?

This report was generated by static analysis. Get an LLM-powered deep review with behavioral reasoning and attack surface mapping.

๐Ÿง  Deep Analysis โ€” $5.00

๐Ÿšจ Incident Response

Kill switch: Stop the agent process

Containment: Review logs for unexpected actions

Recovery: Depends on skill capabilities

๐Ÿ“„ Raw SSDS JSON click to expand
{
  "meta": {
    "document_id": "ssds:auto:atxp:0.1.0",
    "ssds_version": "0.2.0",
    "scanner_version": "0.4.0+fe6fd9123d50",
    "created_at": "2026-03-05T12:04:51.031Z",
    "created_by": {
      "agent": "safeagentskills-cli/generate-ssds"
    },
    "language": "en",
    "notes": "Auto-generated SSDS. Manual review recommended."
  },
  "skill": {
    "name": "Atxp",
    "version": "0.1.0",
    "format": "agent_skill",
    "description": "Agent wallet, identity, and paid tools in one package. Register an agent, fund it via Stripe or USDC, then use the balance for web search, AI image generation, AI video generation, AI music creation, X/Twitter search, email send/receive, and 100+ LLM models. The funding and identity layer for autonomous agents that need to spend money, send messages, or call paid APIs.",
    "publisher": "unknown",
    "source": {
      "channel": "local"
    },
    "artifact": {
      "sha256": "ddc1427a6242a0b94e0fe0714f21511b0a408516dc1c35745706053150674a76",
      "hash_method": "files_sorted"
    }
  },
  "capabilities": {
    "execution": {
      "can_exec_shell": true,
      "can_exec_code": false,
      "privilege_level": "user",
      "can_install_deps": false,
      "can_persist": false
    },
    "filesystem": {
      "reads_workspace": false,
      "reads_user_home": true,
      "reads_system": false,
      "writes_workspace": false,
      "writes_user_home": false,
      "writes_system": false,
      "can_delete": false
    },
    "network": {
      "egress": "any",
      "ingress": false
    },
    "credentials": {
      "reads_env_vars": true,
      "reads_credential_files": true,
      "reads_browser_data": false,
      "reads_keychain": false
    },
    "services": [],
    "actions": {
      "can_send_messages": false,
      "can_post_public": false,
      "can_purchase": true,
      "can_transfer_money": false,
      "can_deploy": false,
      "can_delete_external": false
    },
    "prompt_injection_surfaces": [
      "web"
    ],
    "content_types": [
      "general"
    ]
  },
  "hazards": {
    "hdac": {
      "H": 3,
      "D": 4,
      "A": 4,
      "C": 1
    },
    "flags": [
      "EXEC",
      "FS_READ_USER",
      "NET_EGRESS_ANY",
      "CREDS_ENV",
      "CREDS_FILES",
      "ACT_PURCHASE",
      "PI_WEB"
    ],
    "custom_flags": [
      {
        "code": "SOCIAL_ENGINEERING",
        "name": "Social Engineering Risk",
        "description": "SOCIAL_ENG_VAGUE_DESCRIPTION: Skill description is too vague or missing"
      },
      {
        "code": "TOOL_POISONING",
        "name": "Tool Poisoning",
        "description": "Hidden secondary behavior detected: MCP_TOOL_POISONING_SENSITIVE_DATA, MCP_TOOL_POISONING_REMOTE_STORAGE"
      },
      {
        "code": "DATA_EXFILTRATION",
        "name": "Data Exfiltration Risk",
        "description": "INSTRUCTED_SENSITIVE_SERVICE_ACCESS, MCP_EXFIL_CONVERSATION: Instructs agent to access sensitive services (email, calendar, contacts, drive)"
      }
    ],
    "confidence": {
      "level": "medium",
      "basis": [
        "static_analysis"
      ],
      "notes": "Detected 3 security patterns (5 vendored rule hits). Review recommended."
    },
    "rationale": {
      "H": "H3: Shell/code execution or persistence detected",
      "D": "D4: Critical: Credential theft or data exfiltration",
      "A": "A4: External actions (deploy/message/post)",
      "C": "C1: General content"
    }
  },
  "containment": {
    "level": "maximum",
    "required": [
      {
        "control": "APPROVE_PURCHASE",
        "reason": "Financial actions possible"
      },
      {
        "control": "SANDBOX_CONTAINER",
        "reason": "Code execution capability"
      }
    ],
    "recommended": [
      {
        "control": "LOG_ACTIONS",
        "reason": "Audit trail for all actions"
      }
    ],
    "uncontained_risk": "Risk level depends on manual review of actual capabilities."
  },
  "risks": {
    "risks": [
      {
        "risk": "Social engineering indicators: SOCIAL_ENG_VAGUE_DESCRIPTION",
        "severity": "low",
        "mitigation": "Provide clear, detailed description of skill functionality"
      },
      {
        "risk": "Tool poisoning: hidden behaviors detected (MCP_TOOL_POISONING_SENSITIVE_DATA, MCP_TOOL_POISONING_REMOTE_STORAGE)",
        "severity": "high",
        "mitigation": "Remove references to sensitive data collection."
      },
      {
        "risk": "Data exfiltration patterns: INSTRUCTED_SENSITIVE_SERVICE_ACCESS, MCP_EXFIL_CONVERSATION",
        "severity": "high",
        "mitigation": "Clearly document which sensitive services are accessed and why; use minimal required permissions"
      }
    ],
    "limitations": [
      "Static analysis only - runtime behavior not verified"
    ]
  },
  "incident_response": {
    "kill_switch": [
      "Stop the agent process"
    ],
    "containment": [
      "Review logs for unexpected actions"
    ],
    "recovery": [
      "Depends on skill capabilities"
    ]
  },
  "evidence": [
    {
      "evidence_id": "EV:file-1",
      "type": "file_excerpt",
      "title": "SKILL.md",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:file-2",
      "type": "file_excerpt",
      "title": "_meta.json",
      "file_path": "_meta.json"
    },
    {
      "evidence_id": "EV:cisco-1",
      "type": "file_excerpt",
      "title": "INSTRUCTED_SENSITIVE_SERVICE_ACCESS [HIGH] SKILL.md:64: - Only send email content the agent composed from its own task context or knowle",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-2",
      "type": "file_excerpt",
      "title": "SOCIAL_ENG_VAGUE_DESCRIPTION [LOW] SKILL.md:1: ---",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-3",
      "type": "file_excerpt",
      "title": "MCP_TOOL_POISONING_SENSITIVE_DATA [HIGH] SKILL.md:57: - **Never** log credentials to shared outputs, files, or conversation history.",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-4",
      "type": "file_excerpt",
      "title": "MCP_TOOL_POISONING_REMOTE_STORAGE [MEDIUM] SKILL.md:56: - **Never** include credentials in search queries, prompts, or tool arguments se",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-5",
      "type": "file_excerpt",
      "title": "MCP_EXFIL_CONVERSATION [HIGH] SKILL.md:3: description: Agent wallet, identity, and paid tools in one package. Register an ",
      "file_path": "SKILL.md"
    }
  ]
}