connectors-available
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/search_token.shscript is vulnerable to Python code injection because the shell variable${TOKEN}is interpolated directly into a Python heredoc. A malicious input likeBTC"; import os; os.system('ls'); #would execute arbitrary code. - [COMMAND_EXECUTION]: The scripts
scripts/test_all.shandscripts/test_connector.shuse thesourcecommand to load configuration from.envfiles in the current and home directories. This enables arbitrary shell execution if an attacker can write to these locations. - [PROMPT_INJECTION]: The skill processes and displays data from an external API, creating a surface for indirect prompt injection. Ingestion points: Trading rules are fetched from the Hummingbot API and stored in
data/trading_rules.json. Boundary markers: No delimiters are used when the agent displays the rules table. Capability inventory: The skill possesses the ability to execute shell scripts, run Python code, read/write local files, and make network requests. Sanitization: No validation or escaping is performed on the data retrieved from the API. - [CREDENTIALS_UNSAFE]: The skill relies on default credentials (
admin/admin) for API access and encourages the storage of sensitive information in plaintext.envfiles.
Audit Metadata