eclair
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (HIGH): The script
scripts/eclair-cli.shusesevalto execute acurlcommand with a payload constructed from user-supplied arguments. This is a critical command injection vulnerability that allows arbitrary code execution on the host machine. - Evidence:
eval curl --user ":$API_PASSWORD" ... $PAYLOAD ...where$PAYLOADis built directly from script arguments. - CREDENTIALS_UNSAFE (HIGH): Multiple files contain hardcoded credentials for Bitcoin Core and the Eclair API.
- Evidence in
templates/docker-compose.yml:-rpcuser=bitcoin,-rpcpassword=bitcoin, andDeclair.api.password=devpassword. - Evidence in
scripts/regtest-setup.sh:API_PASSWORD="devpassword". - EXTERNAL_DOWNLOADS (MEDIUM): The scripts
scripts/docker-build.shandscripts/build-pr.shautomate downloading code from the ACINQ/eclair GitHub repository and building Docker images from it. This repository is not on the list of trusted sources. - Evidence:
gh pr checkout "$PR_NUMBER" --repo ACINQ/eclairandgit fetch "$REMOTE". - COMMAND_EXECUTION (MEDIUM): The skill frequently uses
docker execanddocker buildto interact with the host's Docker daemon, which can be used to manipulate or escape the container environment if misconfigured. - Evidence:
docker exec "$BITCOIND_CONTAINER" bitcoin-cli ...inscripts/bitcoin-cli.shand other management scripts.
Recommendations
- AI detected serious security threats
Audit Metadata