skills/roasbeef/claude-files/eclair/Gen Agent Trust Hub

eclair

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
  • COMMAND_EXECUTION (HIGH): The script scripts/eclair-cli.sh uses eval to execute a curl command with a payload constructed from user-supplied arguments. This is a critical command injection vulnerability that allows arbitrary code execution on the host machine.
  • Evidence: eval curl --user ":$API_PASSWORD" ... $PAYLOAD ... where $PAYLOAD is built directly from script arguments.
  • CREDENTIALS_UNSAFE (HIGH): Multiple files contain hardcoded credentials for Bitcoin Core and the Eclair API.
  • Evidence in templates/docker-compose.yml: -rpcuser=bitcoin, -rpcpassword=bitcoin, and Declair.api.password=devpassword.
  • Evidence in scripts/regtest-setup.sh: API_PASSWORD="devpassword".
  • EXTERNAL_DOWNLOADS (MEDIUM): The scripts scripts/docker-build.sh and scripts/build-pr.sh automate downloading code from the ACINQ/eclair GitHub repository and building Docker images from it. This repository is not on the list of trusted sources.
  • Evidence: gh pr checkout "$PR_NUMBER" --repo ACINQ/eclair and git fetch "$REMOTE".
  • COMMAND_EXECUTION (MEDIUM): The skill frequently uses docker exec and docker build to interact with the host's Docker daemon, which can be used to manipulate or escape the container environment if misconfigured.
  • Evidence: docker exec "$BITCOIND_CONTAINER" bitcoin-cli ... in scripts/bitcoin-cli.sh and other management scripts.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 06:33 PM