clanker
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSPROMPT_INJECTIONCREDENTIALS_UNSAFEDATA_EXFILTRATION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): Dependency on unverified third-party packages.\n
- Evidence: The documentation recommends 'npm install clanker-sdk viem' in troubleshooting.md.\n
- Status: 'clanker-devco' and other maintainers are not on the Trusted GitHub Organizations list.\n- [PROMPT_INJECTION] (HIGH): Indirect prompt injection vulnerability surface.\n
- Ingestion points: Recipient lists for airdrops in 'references/airdrops.md'.\n
- Boundary markers: Absent in code examples.\n
- Capability inventory: 'wallet.sendTransaction' (airdrops.md) and 'clanker.deploy' (deployment.md) allow execution of side-effect-heavy blockchain operations.\n
- Sanitization: No sanitization or validation of recipient data is demonstrated in the examples.\n- [CREDENTIALS_UNSAFE] (HIGH): Access to sensitive private keys.\n
- Evidence: Scripts in 'references/airdrops.md' and 'references/deployment.md' access 'process.env.PRIVATE_KEY'.\n
- Risk: While not hardcoded, accessing such secrets in the same environment where untrusted data is processed poses a high risk of exposure or unauthorized use.\n- [DATA_EXFILTRATION] (LOW): Network operations to non-whitelisted domains.\n
- Evidence: The 'registerAirdrop' and 'fetchAirdropProofs' functions in 'references/airdrops.md' interact with external Clanker indexing services.\n
- Status: The Clanker service domain is not on the whitelisted domains list.
Recommendations
- AI detected serious security threats
Audit Metadata