Einstein x402 Blockchain Analytics
PassAudited by VirusTotal on May 12, 2026.
Findings (1)
This skill is classified as suspicious due to its direct handling of a user's cryptocurrency private key to sign on-chain transactions (USDC micropayments on Base network) via the x402 protocol, as implemented in `scripts/lib/x402-pay.mjs`. While the skill includes extensive security warnings (e.g., use a dedicated wallet, prefer environment variables, `chmod 600 config.json`), implements payment confirmation prompts in `scripts/einstein.mjs`, and utilizes EIP-3009 for single-use, fixed-amount transfers, the inherent risk of requiring and using a private key for financial transactions elevates it beyond benign. There is no evidence of intentional malice, data exfiltration beyond the stated payment, or prompt injection attempts to subvert the agent's core directives; the external API call to `analytics.dugganusa.com` in `scripts/einstein.mjs` is for a documented free service.
