meme-scout
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- Remote Code Execution (CRITICAL): The skill uses a highly dangerous pattern where it fetches remote HTML content and executes it directly through the Node.js environment. Any compromise or malicious data on the target website could lead to a full system takeover.\n
- Evidence (SKILL.md): The provided example command pipes the output of
curlthroughsedand directly intonode -e, which executes the resulting string.\n - Evidence (scripts/fetch-trending.js): This script fetches data from DexScreener and uses
vm.runInNewContextto evaluate a string constructed from the remote response.\n- Dynamic Execution (CRITICAL): The skill relies on the Node.jsvmmodule to parse data. As documented by Node.js,vmis not a security sandbox and can be bypassed using well-known techniques to gain access to the hostprocessand execute shell commands.\n - Evidence:
scripts/fetch-trending.jsusesvm.runInNewContext('data = ' + match[1], sandbox)on unvalidated remote input.\n- Indirect Prompt Injection (HIGH): The skill is designed to ingest and process untrusted data from a third-party DEX platform, creating a large attack surface for injection.\n - Ingestion points:
scripts/fetch-trending.jsandSKILL.mdfetch content fromdexscreener.com.\n - Boundary markers: None present. The untrusted data is processed and displayed without isolation.\n
- Capability inventory: The skill can execute arbitrary JavaScript and system commands, which can be triggered by the processed data.\n
- Sanitization: None. The skill assumes the remote data is well-formatted and safe, performing no validation before execution.
Recommendations
- CRITICAL: Downloads and executes remote code from untrusted source(s): https://dexscreener.com/?rankBy=trendingScoreH24&order=desc - DO NOT USE
- AI detected serious security threats
Audit Metadata