apiosk-gateway
Fail
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The
setup-wallet.shscript generates an Ethereum private key and stores it in plaintext at~/.apiosk/wallet.json. Although the script applieschmod 600to the file, plaintext storage of private keys is a high-risk practice for agent environments. - [REMOTE_CODE_EXECUTION]: Multiple files including
README.md,SECURITY.md, andsetup-wallet.shrecommend installing the Foundry toolkit using the commandcurl -L https://foundry.paradigm.xyz | bash. This pattern executes remote code directly in the shell without prior integrity verification. - [COMMAND_EXECUTION]: Several shell scripts (
setup-wallet.sh,call-api.sh,check-balance.sh,usage-stats.sh) execute system commands includingcurl,jq,cast, andbc. Specifically,setup-wallet.shinvokescast wallet newto generate cryptographic material. - [EXTERNAL_DOWNLOADS]: The skill makes frequent network requests to
gateway.apiosk.comfor API discovery, balance checks, and usage statistics, as seen inapiosk-client.jsandapiosk_client.py. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface as it processes external JSON data from the Apiosk gateway and various third-party APIs through the
call-api.shand client libraries. There are no explicit sanitization or boundary markers mentioned for the ingested data.
Recommendations
- HIGH: Downloads and executes remote code from: https://foundry.paradigm.xyz - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata