wallet
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: Sensitive credentials including passwords and BIP39 mnemonics are passed as plain-text command-line arguments.
- Evidence in
wallet.ts: Subcommandscreate,import,unlock,delete,export, androtate-passwordall utilize.requiredOption("--password <password>", ...)or.requiredOption("--mnemonic <mnemonic>", ...). Command-line arguments are visible in system process lists (e.g., viaps) and are often recorded in shell history files. - [CREDENTIALS_UNSAFE]: The skill outputs sensitive private key material (mnemonics) in plaintext to the standard output.
- Evidence in
wallet.ts: Thecreateandexportcommand actions directly print the mnemonic phrase usingprintJson. If this skill is executed by an automated agent or logged by a CI/CD system, these secrets will be exposed in logs. - [CREDENTIALS_UNSAFE]: The skill relies on sensitive environment variables for configuration.
- Evidence in
wallet.ts: Thestatuscommand checks for theCLIENT_MNEMONICenvironment variable. Environment variables can be leaked through process inspection, error reports, or child process inheritance. - [COMMAND_EXECUTION]: The skill facilitates the permanent deletion of sensitive data through CLI commands.
- Evidence in
wallet.ts: Thedeletecommand performs file-system operations to remove wallet data based on provided IDs and passwords.
Recommendations
- AI detected serious security threats
Audit Metadata