solana-token-verification
Warn
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONNO_CODE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill instructs the user or agent to download and install the 'ACP CLI' from an external repository at
https://github.com/Virtual-Protocol/openclaw-acp. - [COMMAND_EXECUTION]: The defined workflow relies on executing a series of shell commands using the downloaded
acptool, includingacp setup,acp browse, andacp job create. - [COMMAND_EXECUTION]: There is a risk of command injection as user-provided data (
contract_address) is interpolated directly into a shell command template (acp job create ... --requirements '{"contract_address": "..."}'). - Ingestion points: The
contract_addressparameter enters the agent context through user input as defined inSKILL.md. - Boundary markers: No delimiters or instructions to ignore embedded malicious commands are present in the command template.
- Capability inventory: The skill documentation explicitly requires the ability to execute shell commands (subprocess calls) to interact with the
acpCLI. - Sanitization: No input validation or escaping mechanisms are specified to ensure the
contract_addressdoes not contain shell metacharacters. - [NO_CODE]: The skill package contains no executable scripts (e.g., .py, .js, .sh), consisting only of markdown instructions and JSON evaluation files.
Audit Metadata