hummingbot
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- Privilege Escalation (HIGH): The file
references/troubleshooting.mdrecommends runningsudo chmod 666 /var/run/docker.sockto resolve permission issues. This is a severe security misconfiguration that permits any user on the system to gain root privileges by interacting with the Docker API. - Indirect Prompt Injection (HIGH): The skill facilitates the execution of complex commands based on untrusted external data (scraped documentation).
- Ingestion points: Documented in
references/trading.mdand other reference files containing content from external URLs (e.g., hummingbot.org). - Boundary markers: Absent; instructions do not distinguish between system-provided rules and scraped data.
- Capability inventory: Includes execution of shell commands (
gateway), Python script execution (hummingbot_quickstart.py), and crypto trade execution viaHummingbotAPIClient. - Sanitization: None; the agent is instructed to use code patterns directly from the reference files.
- Command Execution (HIGH): Multiple files (e.g.,
SKILL.mdandreferences/troubleshooting.md) encourage the execution of shell commands, Docker operations, and local scripts, posing a risk of arbitrary command execution if the input context is manipulated. - External Downloads (MEDIUM):
references/trading.mdrecommends the installation of thehummingbot-api-clientpackage via pip, introducing a dependency on an external package registry that is not within the defined trust scope.
Recommendations
- AI detected serious security threats
Audit Metadata