euler-vaults
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (HIGH): The file
rules/vault-create-market.mddirects the agent/user to clonehttps://github.com/euler-xyz/euler-vault-scripts. The organizationeuler-xyzis not included in the trusted GitHub organizations list. - [REMOTE_CODE_EXECUTION] (HIGH): Following the repository clone, the skill instructs the execution of
./install.shand deployment scripts. This download-then-execute pattern from an untrusted source is a significant security risk. - [PROMPT_INJECTION] (HIGH): The skill establishes a high-impact Indirect Prompt Injection surface (Category 8).
- Ingestion points: Data enters the agent context through contract queries in
rules/risk-check-health.md(AccountLens) and user-provided addresses inrules/sec-audits.md. - Boundary markers: No explicit delimiters or instruction-ignore warnings are used when processing external contract data in code templates.
- Capability inventory: The skill enables high-privilege DeFi operations including
borrow,repay,liquidate, andwithdrawvia theIEVaultandIEVCinterfaces. - Sanitization: Although verification via
GenericFactory.isProxyis suggested inrules/sec-audits.md, the agent remains vulnerable to malicious strings or instructions returned from on-chain calls (e.g., error messages or lens outputs) while having the power to execute financial transactions.
Recommendations
- AI detected serious security threats
Audit Metadata