opentrade-market
Fail
Audited by Gen Agent Trust Hub on Apr 18, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill implements a high-risk installation and update mechanism that fetches a shell script from
https://raw.githubusercontent.com/6551Team/openskills/main/skills/opentrade/install.shand pipes it directly into the shell (| sh). This operation is performed automatically during pre-flight checks and error recovery scenarios.\n- [COMMAND_EXECUTION]: The agent is instructed to execute various local shell commands, includingwhich,cat, anddate, to manage the lifecycle and caching of theopentradeCLI tool.\n- [CREDENTIALS_UNSAFE]: The skill workflow involves managing an API token (OPEN_TOKEN) stored in a.envfile. While the skill provides security warnings against committing these secrets to version control, the active handling of tokens by the agent increases the risk of exposure within session logs.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. Evidence Chain: (1) Ingestion points: Live on-chain market data, trade history, and meme token metadata fetched via the CLI. (2) Boundary markers: No delimiters or instructions are used to distinguish tool output from agent instructions. (3) Capability inventory: The skill has the ability to execute shell commands and write to local files. (4) Sanitization: No sanitization or validation of the external market data is performed before it is processed by the agent.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/6551Team/openskills/main/skills/opentrade/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata