aicoin-freqtrade
Fail
Audited by Gen Agent Trust Hub on Apr 23, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The file
lib/defaults.jsoncontains a hardcodedaccessKeyIdandaccessSecret. While labeled as public free-tier keys, shipping active credentials within skill files is a significant security risk. - [DYNAMIC_EXECUTION]: The
create_strategyaction inscripts/ft-deploy.mjsgenerates Python strategy files by concatenating strings with user-controlled parameters, includingentry_logicandexit_logic. This implementation allows for arbitrary Python code injection into the generated strategy file. - [EXTERNAL_DOWNLOADS]: The skill fetches external resources from well-known sources:
- Downloads the
uvPython manager viacurl | shfromastral.shinscripts/ft-deploy.mjs. - Clones the official Freqtrade repository from GitHub during the deployment process.
- [COMMAND_EXECUTION]: The skill makes extensive use of shell command execution to install system dependencies, manage Python virtual environments, and control the Freqtrade bot processes.
- [DATA_EXFILTRATION]: The skill reads sensitive
.envfiles from the workspace and home directory to harvest API keys. While these are used to authenticate with the vendor's API (open.aicoin.com), the broad file access and subsequent network transmission constitute a data exposure risk. - [REMOTE_CODE_EXECUTION]: The deployment script executes the
setup.shscript provided by the cloned Freqtrade repository. While this is the official installation method, it involves executing a large, third-party shell script with high privileges over the local environment.
Recommendations
- AI detected serious security threats
Audit Metadata