ave-data-rest

Pass

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: SAFECOMMAND_EXECUTIONNO_CODE
Full Analysis
  • [COMMAND_EXECUTION]: The skill operates by executing a local Python script (scripts/ave_data_rest.py) using arguments derived from user input, such as token addresses and search keywords. This creates an indirect injection surface where maliciously formatted user input could attempt to manipulate the command-line execution environment.
  • [NO_CODE]: The core implementation logic and specific API handling are contained within referenced files that are missing from the skill package, preventing a full audit of the script's internal security controls and input validation mechanisms.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 10, 2026, 05:12 PM