authenticate-wallet
Fail
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Unverifiable Dependencies & Remote Code Execution (HIGH): The skill relies on
npx awal@latest, which downloads and executes code from the npm registry every time a tool is called. Theawalpackage is not from a trusted source, and using the@latesttag makes the agent highly vulnerable to supply chain attacks or malicious package updates. - Indirect Prompt Injection (HIGH): The skill defines a flow where the agent reads a user's email to extract an OTP. This creates a dangerous ingestion point for untrusted external data. Without explicit sanitization or boundary markers, an attacker could send a malicious email containing instructions that override the agent's behavior during the wallet authentication process.
- Privilege Escalation (MEDIUM): The
allowed-toolsconfiguration uses broad wildcards (e.g.,auth *andstatus*). This grants the agent excessive permission to execute any subcommand or flag supported by the CLI tool, rather than limiting it to the specific commands required for the task.
Recommendations
- AI detected serious security threats
Audit Metadata