dapp-hyperliquid
Fail
Audited by Snyk on Mar 15, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 1.00). Suspicious — the workflow directs running a raw install.sh fetched from a user-run GitHub repo (raw.githubusercontent.com/purong-huang-1121/...), which is an untrusted/unknown source and piping remote shell scripts into sh is a high-risk malware vector (even though the other URL points to an official-seeming okx repo).
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's required Pre-flight Checks instruct running a curl | sh installer from https://raw.githubusercontent.com/.../install.sh (fetching and executing third‑party code), and the core workflows call out to external Hyperliquid market/orderbook/funding APIs whose returned data are read and used to decide trades, so untrusted third‑party content is fetched and interpreted as part of runtime behavior.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill instructs at runtime to run an installer that downloads and pipes remote code to the shell via "curl -sSL https://raw.githubusercontent.com/purong-huang-1121/skills-store/main/install.sh | sh", which executes fetched code and is required to install the plugin-store dependency the skill relies on.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly a trading interface for the Hyperliquid DEX: it exposes commands to open/close positions (buy, sell), cancel orders, view balances and positions, and broadcast transactions. Trading commands require an EVM private key and use EIP-712 signatures to sign on‑chain actions. This is a specific crypto/blockchain execution tool (wallet signing + order submission), not a generic browser/API caller. It therefore grants direct financial execution capability (moving crypto and placing market orders).
Issues (4)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata