near-connect-hooks
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Unverifiable Dependencies] (MEDIUM): The skill's installation instructions (SKILL.md) and reference files (references/api-reference.md) specify dependencies on
@hot-labs/near-connectandnear-api-js. These packages and their maintainers are not within the defined trusted organization scope. - [Indirect Prompt Injection] (HIGH):
- Ingestion points: Untrusted data enters the agent context through the
argsparameter inviewFunctionandcallFunction, themessagefield insignNEP413Message, andreceiverIdintransfer(found in references/api-reference.md). - Boundary markers: There are no markers or delimiters specified to distinguish between developer instructions and untrusted external data.
- Capability inventory: The skill provides methods for
transfer(moving funds),callFunction(modifying blockchain state), andsignAndSendTransaction(arbitrary blockchain actions). These are high-impact capabilities with significant side effects. - Sanitization: No evidence of input validation or sanitization is present in the examples or API definitions.
- [Privilege Escalation] (HIGH): The library exposes
Actions.addFullAccessKeyandaddFunctionCallKey(SKILL.md, references/api-reference.md). A malicious instruction could trick the agent into adding a full access key controlled by an attacker, leading to total account takeover. ThedeleteKeycapability also allows for the removal of existing security measures. - [Command Execution] (LOW): The skill documentation encourages the execution of
npm installfor third-party packages. While standard for development, in an automated agent context, this involves executing shell commands to fetch external code.
Recommendations
- AI detected serious security threats
Audit Metadata