awp
Warn
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
wallet-raw-call.mjsscript utilizes dynamicimport()to load Node.js modules from a path computed at runtime using thefindAwpWalletDirfunction. - [EXTERNAL_DOWNLOADS]: During the setup process, the skill clones the
awp-walletrepository from the vendor's official GitHub account (github.com/awp-core) and executes itsinstall.shscript to provide necessary CLI functionality. - [COMMAND_EXECUTION]: Several bundled Python scripts, including
preflight.pyandawp-daemon.py, use thesubprocessmodule to execute theawp-walletbinary and other internal scripts to manage the protocol state and user wallet. - [DATA_EXFILTRATION]: The skill performs network requests to
api.awp.shandmainnet.base.orgto query protocol information and submit transaction data via gasless relay endpoints. - [PROMPT_INJECTION]: The skill contains an attack surface for indirect prompt injection via the
Install Worknet Skill(Q6) andawp announcementsfeatures, which ingest content from external URLs. However, the skill includes explicit instructions for the agent to warn users and request confirmation when interacting with third-party sources.
Audit Metadata