hummingbot

Fail

Audited by Gen Agent Trust Hub on Feb 19, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • Privilege Escalation (HIGH): File references/troubleshooting.md contains instructions to execute sudo usermod -aG docker $USER and sudo chmod 666 /var/run/docker.sock. These operations grant a user full control over the Docker daemon, which can be trivially leveraged to obtain root privileges on the host system.
  • Unverifiable Dependencies & Remote Code Execution (MEDIUM): The skill references the installation of the hummingbot-api-client Python package and the execution of local scripts like bin/hummingbot_quickstart.py (mentioned in SKILL.md). These are external components from a source not included in the Trusted External Sources list.
  • Indirect Prompt Injection (LOW): The skill is designed to process untrusted market data and external API responses from cryptocurrency exchanges (references/trading.md).
  • Ingestion points: External market data and API responses referenced in references/trading.md.
  • Boundary markers: Absent.
  • Capability inventory: Order management, balance checks, and Docker management interactions.
  • Sanitization: Absent.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 19, 2026, 05:45 AM