aicoin-trading
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE]: Hardcoded API credentials (
accessKeyIdandaccessSecret) are present inlib/defaults.json. Although labeled as a 'public free-tier' for vendor services, hardcoding secrets remains an unsafe practice. - [EXTERNAL_DOWNLOADS]: The script
scripts/exchange.mjsautomatically executesnpm install --omit=devif theccxtlibrary is missing. This behavior performs unverified downloads and installation of external code from the NPM registry at runtime. - [COMMAND_EXECUTION]: Multiple scripts, including
scripts/trade.mjs,scripts/auto-trade.mjs, andscripts/exchange.mjs, utilizeexecSyncorexecFileSyncto execute shell commands or other Node.js scripts. This pattern introduces risk if input parameters are manipulated to execute arbitrary commands. - [PROMPT_INJECTION]:
SKILL.mdexplicitly mandates a two-step confirmation process for all trades. However,scripts/auto-trade.mjsimplements anAICOIN_INTERNAL_CALLenvironment variable that bypasses these safety checks. This creates an attack surface where an indirect prompt injection could influence the agent to trigger automated trades without the required user confirmation. - [DATA_EXFILTRATION]:
lib/aicoin-api.mjsandscripts/api-key-info.mjssearch for and load.envfiles from several filesystem locations, including the user's home directory (~/.openclaw/.env). This broad search increases the risk of exposing sensitive environment variables from unrelated applications.
Audit Metadata