taiko
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
foundry.tomlconfiguration file in the project template enablesffi = true. This setting allows the Foundryvm.fficheatcode, which permits Solidity scripts and tests to execute arbitrary shell commands on the host machine. This represents a significant security risk as it bypasses the EVM sandbox. - [COMMAND_EXECUTION]: Python utility scripts
calc_blockhash.pyandverify_signal.pyuse thesubprocessmodule to execute thecastCLI tool. This pattern involves spawning external processes based on potentially untrusted network data. - [EXTERNAL_DOWNLOADS]: The skill's project template and instructions recommend downloading external code from GitHub repositories (
foundry-rs/forge-std,OpenZeppelin/openzeppelin-contracts) using theforge installcommand. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. 1. Ingestion points: External RPC responses in
calc_blockhash.pyandverify_signal.py. 2. Boundary markers: Absent. 3. Capability inventory:subprocesscalls in Python scripts andffienabled infoundry.toml. 4. Sanitization: Present (hex-validation for subprocess inputs). The ingestion of external data combined with command execution capabilities creates a risk surface where malicious blockchain data could attempt to influence system-level agent operations.
Audit Metadata