trade
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The skill uses
npxto fetch theawalpackage from the npm registry. Because it uses the@latesttag, the skill is vulnerable to supply chain attacks where a malicious update to the package would be automatically executed without verification. - Evidence: Found in
allowed-toolsdefinition:Bash(npx awal@latest trade *). - REMOTE_CODE_EXECUTION (HIGH): Using
npxto run code that is not pinned to a specific version or hash constitutes unverified remote code execution. - Evidence: Multiple examples and the tool configuration utilize
npx awal@latest. - COMMAND_EXECUTION (MEDIUM): The skill interprets user input (amount, tokens) and incorporates it into bash commands. While the documentation suggests quoting, the underlying mechanism of building shell strings from external input is a pattern that can lead to command injection if not handled by a strictly sanitized interface.
- Evidence:
npx awal@latest trade <amount> <from> <to> [options] - INDIRECT_PROMPT_INJECTION (LOW): The skill ingests untrusted data from the user (tokens, amounts) which are then used in system-level calls.
- Ingestion points:
amount,from,toarguments. - Boundary markers: None present in the command template.
- Capability inventory:
Bashexecution vianpx. - Sanitization: Documentation advises user-side single quoting for dollar signs, but no server-side or agent-side sanitization is defined in the skill logic.
Recommendations
- AI detected serious security threats
Audit Metadata