opentrade-token

Fail

Audited by Snyk on Mar 11, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.90). These links include an unknown GitHub repo plus a raw install.sh intended to be fetched and executed (curl | sh) and a matching unvetted domain (6551.io) for API tokens — together this is high-risk because running remote shell scripts from an untrusted author can execute arbitrary/malicious code or facilitate credential theft.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The content contains high-risk supply-chain and remote-code-execution patterns—most notably repeated instructions to run an unverified remote installer via "curl ... | sh", automatic reinstall/update behavior, and guidance to place API credentials in a local .env while directing users to an external token-issuing URL—none of which explicitly exfiltrate data in the text but together create a strong vector for credential theft or backdoor installation.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). This skill's required workflow (SKILL.md) runs opentrade CLI commands (e.g., token search, toplist, price-info, holders) that fetch public token metadata and lists (including websiteUrl, twitterUrl, telegramUrl, explorerUrl) from open/public APIs and also instructs installing code via curl from raw.githubusercontent.com, and those untrusted, user-generated/public sources are read and used to make follow-on decisions (liquidity checks, communityRecognized, and whether to proceed to swaps), creating a clear path for indirect prompt injection.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (4)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 11, 2026, 08:33 AM
Issues
4