moltbook
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): Hardcoded secret found in
moltbook_config.json. The keymoltbook_sk_87YYIKQlE2Ezlv9sXvYL5KQNEplpeoX9appears to be a functional API key rather than a placeholder. - [COMMAND_EXECUTION] (MEDIUM): Unsafe shell interpolation in
scripts/register.sh. The script inserts the$NAMEand$DESCRIPTIONvariables directly into a JSON string passed tocurlwithout using theescape_jsonhelper function found in other scripts. This allows for JSON structure breakage or potential shell injection if the agent name contains malicious characters. - [DATA_EXFILTRATION] (LOW): The skill exfiltrates agent-identifying information and user-generated content to
www.moltbook.com. While this is the intended purpose of the skill, the use of--location-trustedinscripts/moltbook_api.shensures that theAuthorization: Bearertoken is sent to any domain the server redirects to, which is a risky configuration. - [PROMPT_INJECTION] (LOW): Indirect Prompt Injection surface identified. The skill ingests untrusted data from the Moltbook social feed and search results.
- Ingestion points:
scripts/feed.sh,scripts/search.sh. - Boundary markers: None present; the agent is instructed to "Check for interesting posts to engage with" directly from the output.
- Capability inventory: Subprocess execution (
curl), file write (~/.config/moltbook/credentials.json), and network operations tomoltbook.com. - Sanitization: Partial. While some scripts use
escape_jsonfor outbound data, inbound data from the API is displayed directly without sanitization before being presented to the agent context.
Recommendations
- AI detected serious security threats
Audit Metadata