skills/openclaw/skills/MarketPulse/Gen Agent Trust Hub

MarketPulse

Pass

Audited by Gen Agent Trust Hub on Feb 13, 2026

Risk Level: LOW
Full Analysis

The skill consists of documentation files (README.md, SKILL.md), metadata (_meta.json), and a Python client script (scripts/market_client.py).

  1. Prompt Injection: No patterns indicative of prompt injection attempts were found in any of the files, including metadata and documentation.

  2. Data Exfiltration: The scripts/market_client.py script reads the AISA_API_KEY from an environment variable (os.environ.get("AISA_API_KEY")) and sends it in the Authorization header to https://api.aisa.one. This is the intended and necessary behavior for an API client to authenticate with its service. The skill does not attempt to access or exfiltrate any other sensitive user data (e.g., SSH keys, AWS credentials, local files) to aisa.one or any other external domain. The aisa.one domain is the skill's own backend, not an arbitrary third party.

  3. Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were detected in any of the files.

  4. Unverifiable Dependencies: The Python script (scripts/market_client.py) relies solely on standard Python libraries (argparse, json, os, sys, urllib.request, urllib.parse, urllib.error, datetime, typing). There are no pip install or npm install commands, nor any references to external scripts or binaries that would require downloading and executing unverified code. The curl commands in SKILL.md are examples for direct API interaction, not commands executed by the skill itself.

  5. Privilege Escalation: No commands or patterns (e.g., sudo, chmod 777, service installations) indicating attempts at privilege escalation were found.

  6. Persistence Mechanisms: No attempts to establish persistence (e.g., modifying .bashrc, creating cron jobs, or systemd services) were detected.

  7. Metadata Poisoning: The _meta.json and SKILL.md metadata fields were reviewed and contain no malicious instructions or hidden commands.

  8. Indirect Prompt Injection: The skill processes user input (e.g., ticker symbols, dates) to construct API requests. While any skill processing user input has an inherent, general risk of indirect prompt injection if the input is not properly sanitized, the skill itself does not introduce specific vulnerabilities in this regard. The Python client constructs API parameters in a structured way, mitigating direct command injection into the API calls.

  9. Time-Delayed / Conditional Attacks: No conditional logic based on dates, usage counters, or specific environment variables that would trigger malicious behavior at a later time were found.

Overall, the skill is a straightforward and transparent API client that performs its stated function without introducing security risks.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 13, 2026, 02:29 AM