initia-appchain-dev
Warn
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The script
scripts/install-tools.shinvokessudo apt-get install -y jqto install system dependencies. While part of a setup process, automated use of sudo is a high-privilege operation that can be risky if the script is compromised. - EXTERNAL_DOWNLOADS (MEDIUM): Multiple scripts download and execute content from external sources not included in the Trusted GitHub Organizations list:
scripts/install-tools.shdownloads theweaveandinitiadbinaries fromgithub.com/initia-labsand installs them into the user's path.scripts/scaffold-contract.shperforms agit clonefromgithub.com/initia-labs/movevm.git.scripts/scaffold-frontend.shexecutesnpm installfor numerous packages includingvite,wagmi, and@initialibraries.- PROMPT_INJECTION (LOW): The scripts
scripts/check-provider-setup.shandscripts/verify-appchain.shprocess data from external files and network RPC responses, which are surfaces for Indirect Prompt Injection. - Ingestion points: User-provided React source files in
check-provider-setup.sh; blockchain RPC status responses inverify-appchain.sh. - Boundary markers: Absent; the scripts do not use delimiters to isolate processed data from the agent's internal reasoning context.
- Capability inventory: The skill possesses the capability to execute shell commands, perform file system writes, and conduct network operations via the
weaveandminitiadbinaries. - Sanitization: No sanitization or validation of the ingested content is performed beyond basic regex matching for verification purposes.
Audit Metadata