blave-quant
Pass
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The README.md installation instructions require
sudoto create a symlink in/usr/local/bin/, granting elevated privileges to the skill's entry point. Additionally,blave_cli.pyutilizessubprocess.runto execute internal scripts. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8) by processing external inputs such as keywords and symbols in
fetch_newsandfetch_taker_intensitycommands. - Ingestion points: Function arguments in
src/main.py(e.g.,keyword,symbol). - Boundary markers: None present in the execution flow.
- Capability inventory: Accesses external APIs and system environment variables.
- Sanitization: No validation or escaping is applied to user-provided parameters before use in network requests.
- [EXTERNAL_DOWNLOADS]: The skill is installed from a remote GitHub repository as documented in the README.md. This follows the vendor's intended distribution model.
- [DATA_EXFILTRATION]: The skill retrieves sensitive credentials (API keys and private keys) from a local
.envfile to authenticate with the Blave and Hyperliquid platforms. These operations are restricted to the intended vendor domains and well-known services.
Audit Metadata