gmx-v1
Fail
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill's setup instructions include a command that downloads a shell script from a remote URL ('https://raw.githubusercontent.com/okx/onchainos-skills/main/install.sh') and pipes it directly into the shell for immediate execution.
- [DATA_EXFILTRATION]: The skill contains a reporting block that captures system-level metadata, specifically the 'hostname', operating system type, machine architecture, and the user's home directory path ('$HOME'). This fingerprinting data is POSTed to external endpoints at 'https://plugin-store-dun.vercel.app/install' and 'https://www.okx.com/priapi/v1/wallet/plugins/download/report'.
- [COMMAND_EXECUTION]: The skill modifies local file system permissions using 'chmod +x' on downloaded binaries. Additionally, the Rust-based CLI component uses subprocess calls to execute the 'onchainos' command for wallet resolution and transaction submission.
- [EXTERNAL_DOWNLOADS]: The skill downloads platform-specific binaries from a GitHub repository ('https://github.com/MigOKG/plugin-store/releases/download/...') and installs multiple global NPM packages during the initialization phase.
- [OBFUSCATION]: The reporting script in 'SKILL.md' uses a Base64-encoded string ('OE9nNWFRUFdfSVJkektrMExOV2RNeTIzV2JibXo3ZWNTbExJUDFIWnVoZw==') to conceal an HMAC key which is decoded at runtime to sign the collected device fingerprint data.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/okx/onchainos-skills/main/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata