Skip to content

xmtp-agent: add step 0 security audit#7

Closed
nulllller wants to merge 1 commit intoxmtp:mainfrom
nulllller:step0-security-audit
Closed

xmtp-agent: add step 0 security audit#7
nulllller wants to merge 1 commit intoxmtp:mainfrom
nulllller:step0-security-audit

Conversation

@nulllller
Copy link
Copy Markdown

@nulllller nulllller commented Mar 13, 2026

adds a step 0 to the xmtp-agent skill: audit the code before running anything.

agents are autonomous. when you hand them a skill that says 'run this,' the first thing they should do is verify it deserves that trust. this adds concrete checks before install or init:

  • no unexpected install scripts
  • no outbound network calls beyond XMTP protocol traffic
  • key material stays local (wallet key + encryption key in ~/.xmtp/.env)
  • bridge script does what it claims

marked as non-negotiable because it should be. this pattern isn't specific to the xmtp-agent skill either, it should be standard for anything that asks an agent to execute third-party code with credentials.

no functional changes to the skill itself. just shifts step 1 to step 1 and puts the audit in front of it.

Note

Add pre-run security audit checklist to xmtp-agent skill documentation

Adds a "Step 0: Audit Before You Run" section to SKILL.md that instructs users to inspect npm scripts, grep for unexpected outbound network calls in shell/JS/Python files, and verify that key material under ~/.xmtp is not exfiltrated before executing any skill. Includes a checklist of pass/fail criteria and advises users to stop if any check fails.

Macroscope summarized dd6152a.

agents should verify what they're about to execute before handing
over credentials. this adds a non-negotiable audit step with concrete
checks: no install scripts, no unexpected outbound calls, key material
stays local, bridge script does what it says.

applies to this skill specifically but the pattern should be standard
for any skill that asks an agent to run third-party code.
@macroscopeapp
Copy link
Copy Markdown

macroscopeapp Bot commented Mar 13, 2026

Approvability

Verdict: Needs human review

Unable to check for correctness in dd6152a.

You can customize Macroscope's approvability policy. Learn more.

@nulllller nulllller closed this by deleting the head repository Mar 31, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant