injective-trading-autosign

Fail

Audited by Snyk on Apr 12, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The skill requires providing a keystore password as a parameter to authz_grant/authz_revoke calls (shown inline as password: ****), which would force the agent to accept and include a secret value verbatim in generated commands/requests, creating an exfiltration risk.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill explicitly implements on-chain AuthZ delegation for Injective, including concrete commands (authz_grant, authz_revoke) and specific Cosmos message types that allow placing, cancelling, and batch-managing derivative market orders (e.g., MsgCreateDerivativeMarketOrder, MsgCreateDerivativeLimitOrder, MsgCancelDerivativeOrder, MsgBatchUpdateOrders, MsgIncreasePositionMargin). This is a narrowly scoped, crypto/blockchain capability designed to let a grantee key execute market orders and manage positions without per-trade confirmations — i.e., it directly enables financial execution (trading) on-chain rather than being a generic tool.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
HIGH
Analyzed
Apr 12, 2026, 10:16 AM
Issues
2