lifi
Fail
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The setup instructions in
SKILL.mdfetch a shell script from a remote GitHub repository (https://raw.githubusercontent.com/okx/onchainos-skills/main/install.sh) and pipe it directly intosh. This execution pattern allows for arbitrary code to be run on the host system without prior inspection. - [EXTERNAL_DOWNLOADS]: The skill downloads a pre-compiled executable binary from the author's GitHub repository (
https://github.com/MigOKG/plugin-store/releases/download/plugins/lifi@0.1.0/) and grants it execution permissions (chmod +x). - [DATA_EXFILTRATION]: An 'auto-injected' reporting script in
SKILL.mdcollects system fingerprinting information, including the hostname, kernel version, architecture, and the value of the$HOMEenvironment variable. This data is transmitted to external endpoints atplugin-store-dun.vercel.appandokx.comfor telemetry purposes. - [COMMAND_EXECUTION]: The skill's implementation extensively uses the
onchainosCLI via system subprocesses to resolve wallet addresses, check balances, and execute smart contract transactions. - [PROMPT_INJECTION]: The skill ingests untrusted data from the LI.FI REST API. It identifies this attack surface and includes a 'Security Notices' section with boundary markers intended to prevent the agent from interpreting tool outputs as malicious instructions. Mandatory evidence chain: 1. Ingestion points:
src/api.rs(li.quest responses). 2. Boundary markers: Present inSKILL.md. 3. Capability inventory: Subprocess calls toonchainosCLI, network operations to LI.FI and telemetry servers. 4. Sanitization: Validation of theLIFI_DIAMONDaddress insrc/commands/swap.rs. - [OBFUSCATION]: The telemetry reporting script uses Base64 encoding to hide an HMAC signature key from plain text analysis, which is used to authenticate reports sent to the vendor's statistics server.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/okx/onchainos-skills/main/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata