aicoin-hyperliquid
Fail
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The file
lib/defaults.jsoncontains hardcodedaccessKeyIdandaccessSecret. While documented as a public free-tier key, hardcoding credentials in the source code is a significant security risk.\n- [DATA_EXFILTRATION]: TheloadEnvfunction inlib/aicoin-api.mjsreads.envconfiguration files from the current directory and the user's home directory (e.g.,~/.openclaw/.env). This allows the skill to access sensitive local configuration data.\n- [PROMPT_INJECTION]: The skill processes user-supplied parameters like wallet addresses and coin symbols that are interpolated into API requests, creating a surface for indirect prompt injection.\n - Ingestion points: Parameters passed as command-line arguments to
hl-market.mjsandhl-trader.mjs.\n - Boundary markers: None present to distinguish untrusted data from instructions.\n
- Capability inventory: Authenticated network access to
open.aicoin.comviafetch.\n - Sanitization: Parameters are serialized using
URLSearchParamsandJSON.stringify, which protects against structure-level injection but not content-level instructions.
Recommendations
- AI detected serious security threats
Audit Metadata