nansen-batch-wallet
Pass
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes the
nansenCLI tool using shell variables$ADDRESSESand$CHAIN. The variable$CHAINis used without quotes, and while$ADDRESSESis quoted, both remain susceptible to shell injection (e.g., via backticks or command substitution) if the agent does not sanitize the user-provided inputs. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it ingests untrusted data (wallet addresses) which is then interpolated directly into a shell command capability.
- Ingestion points: The
ADDRESSESandCHAINvariables inSKILL.mdused for the shell command. - Boundary markers: None identified; there are no delimiters or instructions to ignore embedded commands in the input data.
- Capability inventory: Subprocess execution via the shell command
nansen research profiler batch. - Sanitization: No sanitization or validation of the input strings is performed within the provided script.
Audit Metadata