lnd
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (HIGH): The script
scripts/docker-start.shis vulnerable to shell command injection. It collects unhandled positional arguments into a variable that is later executed usingevalwithout any sanitization or quoting. - Evidence: In
scripts/docker-start.sh, lines 98-101 append arguments toCOMPOSE_EXTRA_ARGS, and line 147 executes the final command viaeval "$CMD". - CREDENTIALS_UNSAFE (HIGH): The skill contains multiple instances of hardcoded RPC credentials ('devuser' and 'devpass') across various scripts and Docker Compose templates. While intended for local test networks (regtest/simnet), they represent a hardcoded secret pattern.
- Evidence: Found in
scripts/bitcoin-cli.sh,scripts/mine.sh,scripts/multi-node-setup.sh,scripts/regtest-setup.sh,templates/docker-compose-multi.yml,templates/docker-compose.yml, andtemplates/start-lnd.sh. - EXTERNAL_DOWNLOADS (LOW): The build scripts retrieve source code and PR data from the
lightningnetwork/lndGitHub repository. This repository is not included in the provided list of trusted GitHub organizations. - Evidence:
scripts/docker-build.shandscripts/build-pr.shusegit fetchandgh pr checkoutto pull remote code for image building.
Recommendations
- AI detected serious security threats
Audit Metadata