crypto-gold-monitor
Warn
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
crypto-monitor.shcontains a code injection vulnerability. In theget_metalsfunction, the variablesgold,silver, andprev_goldare interpolated directly into command strings forpython3 -candbc. For example, the commandpython3 -c "... .get('gold', $gold) ..."constructs a Python script using the raw value of the$goldvariable. Since this variable can be populated by external API responses or theupdatecommand, a malicious input could escape the intended logic to execute arbitrary Python or shell commands on the host system. - [EXTERNAL_DOWNLOADS]: The skill retrieves real-time financial data from several external services, including CoinGecko (
api.coingecko.com), Yahoo Finance (query1.finance.yahoo.com), ExchangeRate-API (api.exchangerate-api.com), and GoldAPI (www.goldapi.io). These external requests are used to fetch the pricing information displayed by the skill.
Audit Metadata