executing-agw-transactions
Pass
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
agwCLI tool to perform various blockchain operations, including signing messages, sending transactions, and deploying contracts. This execution is scoped to the tool's specific functionality and includes mandatory dry-run steps to prevent accidental or malicious execution. - [PROMPT_INJECTION]: The skill represents a surface for indirect prompt injection as it interpolates user-provided data into JSON payloads for shell commands. However, the risk is mitigated by the instruction to always perform a dry-run preview and require explicit confirmation.
- Ingestion points: User-provided data in the
--jsonarguments of theagwcommands (SKILL.md). - Boundary markers: The instructions use single quotes for JSON strings in examples but do not specify robust programmatic boundaries.
- Capability inventory: Execution of the
agwCLI for transaction signing, broadcasting, and contract interaction across all listed tasks. - Sanitization: No automated sanitization or escaping is defined in the instructions; the skill relies on the agent's dry-run capability and user verification as the primary security controls.
- [CREDENTIALS_UNSAFE]: The skill refers to
AGW_*environment variables for runtime configuration. This is a standard and safe practice for CLI secret management, and the skill does not contain any hardcoded credentials or instructions that would lead to credential exfiltration.
Audit Metadata