evm-wallet-skill
Fail
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill's installation process downloads an entire codebase from an untrusted GitHub repository.
- Evidence:
git clone https://github.com/surfer77/evm-wallet-skill.git /tmp/evm-wallet-tmpfollowed by moving the files into the skill directory. - Risk: Downloading code from untrusted sources can introduce malicious scripts or backdoors into the environment.
- [REMOTE_CODE_EXECUTION]: The skill executes code downloaded from the internet using Node.js and manages dependencies from an untrusted source.
- Evidence:
cd "$SKILL_DIR" && npm installand subsequent execution of scripts vianode src/*.js. - Risk: Arbitrary code execution during the installation phase (via npm lifecycle scripts) or runtime execution of unverified logic.
- [COMMAND_EXECUTION]: The skill uses shell commands to perform sensitive operations like token transfers, swaps, and smart contract interactions.
- Evidence: Commands such as
node src/transfer.js <chain> <to_address> <amount> --yes --jsonandnode src/contract.js ... --yes --json. - Risk: While intended for functionality, these commands allow the agent to perform irreversible financial transactions.
- [DATA_EXPOSURE]: The skill manages a local JSON file containing a private key.
- Evidence: The file
~/.evm-wallet.jsonis mentioned as the storage for the private key. - Risk: If the agent is compromised via prompt injection or if other local processes gain access, the user's private keys and assets could be stolen.
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes external data from smart contract outputs and user inputs.
- Ingestion points: User-provided addresses, amounts, and smart contract function arguments in
src/contract.jsandsrc/transfer.js. - Boundary markers: The instructions tell the agent to confirm with the user, but no technical delimiters or sanitization logic are provided in the prompts.
- Capability inventory: The skill can execute shell commands (
node), perform network operations (blockchain transactions), and write to the filesystem. - Sanitization: No explicit sanitization or escaping of external content is mentioned before it is processed by the local scripts.
- Severity: LOW (Surface risk for indirect instruction execution through processed data).
Recommendations
- AI detected serious security threats
Audit Metadata