analyzing-market-sentiment
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [DYNAMIC_EXECUTION]: The script
scripts/news_sentiment.pyattempts to dynamically load code from a sibling plugin directory usingsys.path.insert. It targets../../../../../crypto-news-aggregator/skills/aggregating-crypto-news/scriptsto importNewsAggregator. This computed path loading is a risk if an attacker can manipulate the directory structure or place malicious files in the targeted relative path. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection via external data sources. The
scripts/news_sentiment.pyfile fetches article titles and summaries from various RSS feeds (CoinTelegraph, CoinDesk, Decrypt). These headlines are processed and presented back to the agent without comprehensive sanitization beyond HTML tag removal. A malicious news headline could potentially contain instructions aimed at influencing the agent's subsequent actions. - Ingestion points:
scripts/news_sentiment.py(via RSS feeds). - Boundary markers: None identified in the processing of news text.
- Capability inventory: Execution of Python scripts via Bash tool (
crypto:sentiment-*), file reading (Read). - Sanitization: Uses simple regex
re.sub(r"<[^>]+>", "", title)to strip HTML, which does not prevent natural language instruction injection. - [DATA_EXPOSURE]: The documentation in
references/implementation.mdinstructs the agent to load API credentials from{baseDir}/config/crypto-apis.env. While the skill does not provide this file itself, it defines a pattern where sensitive credentials are expected in a specific local configuration file, which could be a target for other malicious skills.
Audit Metadata