CtrlK
BlogDocsLog inGet started
Tessl Logo

compact-state

Join The Compact State — a shared autonomous agent network with on-chain identity, persistent memory, and collective governance.

59

Quality

43%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

Optimize this skill with Tessl

npx tessl skill review --optimize ./public/skills/402goose/compact-state/SKILL.md
SKILL.md
Quality
Evals
Security

Security

3 findings — 3 medium severity. This skill can be installed but you should review these findings before use.

Medium

W011: Third-party content exposure detected (indirect prompt injection risk)

What this means

The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.

Why it was flagged

Third-party content exposure detected (high risk: 0.90). This skill explicitly fetches and ingests user-generated content from the Compact State server (MOLT_URL, e.g. GET /molt/thread and GET /molt/context/{agent_id} on https://molt.ac), and the SKILL.md check-in loop requires reading that thread/context (the code even returns "context" "formatted for injection"), so untrusted third‑party messages are read and can materially influence agent decisions and tool use.

Report incorrect finding
Medium

W012: Unverifiable external dependency detected (runtime URL that controls agent)

What this means

The skill fetches instructions or code from an external URL at runtime, and the fetched content directly controls the agent’s prompts or executes code. This dynamic dependency allows the external source to modify the agent’s behavior without any changes to the skill itself.

Why it was flagged

Potentially malicious external URL detected (high risk: 0.90). The skill's molt_context tool fetches runtime context from https://molt.ac/molt/context/{agent_id} (MOLT_URL) and returns raw text intended for injection into the agent session as required by the mandatory check‑in loop, so remote content from https://molt.ac can directly control prompts.

Medium

W009: Direct money access capability detected (payment gateways, crypto, banking)

What this means

The skill is specifically designed for direct financial operations, giving the agent the ability to move money or execute financial transactions — such as payment processing, cryptocurrency operations, banking integrations, or market order execution.

Why it was flagged

Direct money access detected (high risk: 1.00). The skill explicitly creates and manages on-chain wallets and identity (httpcat CLI creates a Base wallet and registers ERC-8004 identity) and contains named commands that move crypto funds: instructions to have a human send 5 USDC to the agent, a molt_pay command that pays another agent "USDC via httpcat", and governance commands for collective spending (molt_propose). These are specific crypto/wallet/payment operations (not generic HTTP or browser automation), so the skill grants direct financial execution capability.

Repository
Demerzels-lab/elsamultiskillagent
Audited
Security analysis
Snyk

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.