ave-data-rest
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONNO_CODE
Full Analysis
- [COMMAND_EXECUTION]: The skill operates by executing a local Python script (scripts/ave_data_rest.py) using arguments derived from user input, such as token addresses and search keywords. This creates an indirect injection surface where maliciously formatted user input could attempt to manipulate the command-line execution environment.
- [NO_CODE]: The core implementation logic and specific API handling are contained within referenced files that are missing from the skill package, preventing a full audit of the script's internal security controls and input validation mechanisms.
Audit Metadata