monitoring-whale-activity
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill contains conflicting instructions between its core documentation and its implementation guides. Specifically,
references/implementation.mddirects the agent to use tool patterns likeBash(crypto:whale-*)which are not authorized in theSKILL.mdfrontmatter, and suggests reading credentials from an external.envfile that is not part of the skill distribution. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection vulnerabilities.
- Ingestion points:
scripts/whale_api.py(Whale Alert and Etherscan APIs) andscripts/price_service.py(CoinGecko API) fetch data from external sources. - Boundary markers: None present. Data retrieved from external APIs is printed to the console without delimiters or instructions to the agent to disregard potential embedded commands.
- Capability inventory: The agent is granted
Bashexecution privileges (restricted topython:*whale*), along withRead,Write,Edit,Grep, andGlobcapabilities. - Sanitization: No sanitization or validation of API response content is performed before the data is presented to the agent.
- [EXTERNAL_DOWNLOADS]: The Python scripts perform GET requests to
api.whale-alert.io,api.etherscan.io, andapi.coingecko.com. These are well-known services and the network activity is consistent with the skill's purpose. - [COMMAND_EXECUTION]: The skill's primary workflow involves the agent executing a Python CLI tool (
scripts/whale_monitor.py) to query and analyze blockchain data.
Audit Metadata