lit-protocol-flows
Pass
Audited by Gen Agent Trust Hub on May 5, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Downloads the
@lit-protocol/flowspackage from the npm registry usingnpx -yfor CLI operations. - [COMMAND_EXECUTION]: Utilizes various shell commands to manage the development lifecycle, including
login,publish,invoke, andsecretsmanagement. - [DATA_EXFILTRATION]: The
publishcommand uploads local JavaScript files to Lit Protocol's remote TEE infrastructure. This is the intended behavior for deploying functions to the platform. - [REMOTE_CODE_EXECUTION]: Triggering functions via the
invokecommand or HTTP API calls results in JavaScript execution within Lit Protocol's remote TEE environment. - [CREDENTIALS_UNSAFE]: Provides mechanisms for managing API keys and encrypted secrets. The instructions include placeholders for tokens and demonstrate setting secrets specifically for the TEE environment.
- [PROMPT_INJECTION]: The skill processes untrusted user input via the
paramsobject during flow invocation. - Ingestion points: User-supplied input in the
--paramsflag or HTTP request body flows into theparamsglobal variable in the TEE. - Boundary markers: None identified in the provided documentation.
- Capability inventory: The TEE environment provides access to
fetch,ethers, andLit.Actionsfor blockchain and network operations. - Sanitization: No explicit sanitization or validation of the input parameters is described in the skill instructions.
Audit Metadata