binance-pay
Fail
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill processes untrusted external content (user-supplied order and refund details) while maintaining capabilities with significant side effects (financial transactions).
- Ingestion points: Variables such as
<ORDER_ID>,<PREPAY_ID>, and order amounts within the shell templates inSKILL.md. - Boundary markers: None present; user inputs are interpolated directly into shell script payloads.
- Capability inventory: Subprocess execution via
curlto perform POST requests for order creation, closure, and refunding. - Sanitization: No sanitization, escaping, or validation of user-provided inputs is implemented in the provided scripts.
- Command Execution (LOW): The skill requires the
curl,openssl, andjqbinaries to be present on the system and uses them to construct and send authenticated API requests. This is expected behavior for this functionality. - Data Exfiltration (LOW): The skill transmits transaction data to
https://bpay.binanceapi.com. While this is the official API endpoint for Binance Pay, users must be aware that financial data is being sent to a third-party service.
Recommendations
- AI detected serious security threats
Audit Metadata