meme-executor
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (LOW):
scripts/auto-trader.tsutilizeschild_process.spawnSyncto invokescripts/execute-trade.tsvia thenpx tsxrunner. While the script path is resolved locally, this subprocess execution model increases the attack surface for potential command-line manipulation if validation logic is circumvented.\n- EXTERNAL_DOWNLOADS (LOW): The skill performs outbound network requests usingfetch()to the Jupiter Aggregator API (quote-api.jup.ag) and Solana RPC endpoints (e.g.,api.mainnet-beta.solana.com). These connections to non-whitelisted domains are necessary for its blockchain functionality but represent an external communication channel.\n- PROMPT_INJECTION (LOW): A surface for indirect prompt injection exists inscripts/auto-trader.ts. The script ingests untrusted token metadata (price, liquidity, security metrics) from external JSON files and uses it to drive automated trading decisions and generate trade plans. Maliciously crafted data could influence the automated decision-making logic.\n - Ingestion points:
scripts/auto-trader.ts(via theloadMemeTokensfunction reading from an external file).\n - Boundary markers: Absent; data is parsed into objects but lacks strict instruction isolation or delimiters.\n
- Capability inventory: Automated trade plan generation and simulated execution via subprocess.\n
- Sanitization: Partial; basic threshold-based filtering (e.g., liquidity checks, risk scores) is applied in the
shouldConsiderTokenfunction.
Audit Metadata