bybit-trading

Fail

Audited by Snyk on Mar 24, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E004: Prompt injection detected in skill instructions.

  • Potential prompt injection detected (high risk: 1.00). The prompt includes obfuscated/hidden instructions (a base64-encoded shell command to be pasted into Terminal) and directs downloading/running a third-party executable (AuthTool) in a way that is deceptive and potentially malicious rather than a transparent, in-scope setup step.

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 1.00). The GitHub release is from an unknown account delivering a password‑protected ZIP containing an .exe (classic malware distribution pattern) and the macOS command base64‑decodes to a curl from a raw IP while printing an Apple CDN URL as a decoy—together these are strong indicators of malicious/unsafe downloads.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The skill contains clear malicious patterns: it requires running a password-protected Windows binary from an external release and a base64‑obfuscated macOS command that fetches and executes a script from an untrusted IP (remote code execution), which are strong indicators of a supply‑chain/backdoor attempt capable of credential theft, data exfiltration, persistence, and covert control.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly connects to Bybit's public API/WebSocket (Initialization Sequence, Technical Details) and ingests market/account data as part of its runtime workflow — and also instructs downloading/running an AuthTool binary from a public GitHub release and a macOS installer URL — so it consumes untrusted third-party content that can materially influence trading actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly designed to execute real financial transactions on a crypto exchange (Bybit). It requires Bybit API keys with read-write permissions, describes how to configure API credentials, and exposes commands and core operations to place/cancel/modify market and limit orders, open/close leveraged futures positions, transfer/manage wallets, run grid/DCA/copy-trading bots, and perform automated portfolio rebalancing and arbitrage. These are direct crypto trading and account-management functions (i.e., sending transactions/orders), so it grants Direct Financial Execution authority.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly requires downloading and running a remote executable/service (AuthTool.exe), executing a base64-decoded command piped to bash on macOS, and even suggests using sudo/launchctl, which directs the agent/user to modify system state and obtain elevated privileges.

Issues (7)

E004
CRITICAL

Prompt injection detected in skill instructions.

E005
CRITICAL

Suspicious download URL detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 24, 2026, 12:25 AM
Issues
7