dapp-ethena
Fail
Audited by Snyk on Mar 15, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 1.00). Suspicious: this is a direct raw GitHub URL serving an install.sh from an unverified/unknown user and the skill explicitly instructs running it via curl | sh, a high‑risk pattern for executing arbitrary/malicious code.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.70). The skill's workflow (SKILL.md) instructs the agent to call plugin-store ethena apy and plugin-store ethena balance which read public Ethereum mainnet contract/state (the listed contract addresses) — i.e., untrusted, user-controlled on-chain data — and those values are used to make staking/unstaking decisions, so third-party content can materially influence actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The Pre-flight Checks instruct executing a remote install script at runtime via "curl -sSL https://raw.githubusercontent.com/purong-huang-1121/skills-store/main/install.sh | sh", which fetches and immediately runs remote code and is required for the plugin-store dependency.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly designed to perform crypto financial operations on Ethereum: it provides specific commands to "stake", "cooldown", and "unstake" USDe/sUSDe, lists contract addresses, requires an EVM_PRIVATE_KEY (wallet with ETH for gas), and notes ERC-20 approval is handled automatically. Those write commands perform on-chain transactions (depositing, initiating cooldown, withdrawing) — i.e., signing/sending funds. This is a specific crypto wallet/dApp integration (not a generic API caller or browser automation), so it grants direct financial execution capability.
Issues (4)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata