gate-exchange-assets
Warn
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The setup.sh script uses sudo to install the gate-cli binary into /usr/local/bin if the user-local installation fails.
- [EXTERNAL_DOWNLOADS]: The skill downloads the gate-cli binary and checksums from github.com/gate/gate-cli during the setup process.
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by processing untrusted data from the Gate Exchange API. * Ingestion points: Data returned from gate-cli asset and account book commands. * Boundary markers: No explicit delimiters are used to isolate API data in the output templates. * Capability inventory: Shell command execution via gate-cli and setup.sh. * Sanitization: No explicit validation or escaping of API content before interpolation.
Audit Metadata