aelf-skills-hub
Fail
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill implements a bootstrap mechanism that retrieves external code and executes it on the host system. Evidence in
scripts/bootstrap.ts: ThedownloadViaGithubanddownloadViaNpmfunctions fetch external repositories and packages, while theinstallSkillDependenciesfunction executesbun installwithin those directories, which can trigger arbitrary lifecycle scripts. - [COMMAND_EXECUTION]: The skill utilizes system shell commands to perform its core management tasks. Evidence in
scripts/lib/utils.ts: TherunCommandfunction wrapsnode:child_process.spawnSyncto execute tools such asgit,npm,tar, andbunwith parameters derived from external catalog data. - [EXTERNAL_DOWNLOADS]: The skill is pre-configured to download resources from multiple external GitHub organizations and npm. Evidence in
skills-catalog.json: The registry contains URLs for repositories underAElfProject,AelfScanProject,Awaken-Finance,eforest-finance,Portkey-Wallet, andTomorrowDAOProject, none of which are in the explicitly trusted vendors list. - [PROMPT_INJECTION]: The skill relies on natural language intent processing to route users to various skills and trigger the bootstrap process, creating a vulnerability surface for indirect injection. Ingestion points: User intent strings processed for routing logic. Capability inventory: Execution of system commands via
spawnSync. Sanitization: No explicit boundary markers or instruction-ignoring delimiters are used when processing the intent routing.
Recommendations
- AI detected serious security threats
Audit Metadata