injective-cli
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill documentation provides instructions for managing wallet credentials, including storing passphrases in
~/.injectived/keystore_password.txtand using theunsafe-export-eth-keycommand to handle raw private keys. Although the skill suggests best practices such as restrictive file permissions and avoiding logs, the management of raw cryptographic secrets is a high-risk activity. - [COMMAND_EXECUTION]: The skill includes a utility script
scripts/map_injectived_cli.pythat executes theinjectivedbinary locally usingsubprocess.run. It recursively explores subcommands by capturing the output of help flags, which relies on the integrity of the binary being executed. - [EXTERNAL_DOWNLOADS]: The workflow recommends the installation of the
injective-corepackage from NPM. This is a vendor-owned package from InjectiveLabs and is documented as a necessary component for the skill's primary function. - [PROMPT_INJECTION]: The command mapping script parses text output from the
injectivedCLI to generate documentation. This mechanism constitutes an indirect prompt injection surface where a malicious or compromised binary could produce output designed to influence the agent's behavior or poison the resulting reference material.
Audit Metadata