NYC

clanker

Fail

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSPROMPT_INJECTIONCREDENTIALS_UNSAFEDATA_EXFILTRATION
Full Analysis
  • [EXTERNAL_DOWNLOADS] (MEDIUM): Dependency on unverified third-party packages.\n
  • Evidence: The documentation recommends 'npm install clanker-sdk viem' in troubleshooting.md.\n
  • Status: 'clanker-devco' and other maintainers are not on the Trusted GitHub Organizations list.\n- [PROMPT_INJECTION] (HIGH): Indirect prompt injection vulnerability surface.\n
  • Ingestion points: Recipient lists for airdrops in 'references/airdrops.md'.\n
  • Boundary markers: Absent in code examples.\n
  • Capability inventory: 'wallet.sendTransaction' (airdrops.md) and 'clanker.deploy' (deployment.md) allow execution of side-effect-heavy blockchain operations.\n
  • Sanitization: No sanitization or validation of recipient data is demonstrated in the examples.\n- [CREDENTIALS_UNSAFE] (HIGH): Access to sensitive private keys.\n
  • Evidence: Scripts in 'references/airdrops.md' and 'references/deployment.md' access 'process.env.PRIVATE_KEY'.\n
  • Risk: While not hardcoded, accessing such secrets in the same environment where untrusted data is processed poses a high risk of exposure or unauthorized use.\n- [DATA_EXFILTRATION] (LOW): Network operations to non-whitelisted domains.\n
  • Evidence: The 'registerAirdrop' and 'fetchAirdropProofs' functions in 'references/airdrops.md' interact with external Clanker indexing services.\n
  • Status: The Clanker service domain is not on the whitelisted domains list.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 10:32 PM