phantom-connect
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [Prompt Injection] (HIGH): The skill is highly vulnerable to Indirect Prompt Injection through the ingestion of untrusted transaction data from external APIs. * Ingestion points:
nft-minting.md(/api/mint) andpayments.md(/api/payments/create). * Boundary markers: Absent. * Capability inventory:solana.signAndSendTransactionandsolana.signMessageallow for direct movement of funds or authorization. * Sanitization: Absent. Transaction data received as base64 strings from remote endpoints is signed and broadcast without validation or human-in-the-loop verification. - [External Downloads] (MEDIUM): The documentation promotes runtime execution of third-party templates using
npx. * Evidence:browser-sdk.mdsuggestsnpx -y create-solana-dapp@latest -t solana-foundation/templates/community/phantom-embedded-js. * Risk: This pattern executes unverified code fromsolana-foundation, which is not within the defined list of trusted organizations. - [Command Execution] (LOW): Standard usage of package managers for installing development dependencies. * Evidence: Multiple instances of
npm installandnpx expo installfor Solana and Phantom SDKs.
Recommendations
- AI detected serious security threats
Audit Metadata