Buzz BD

PassAudited by VirusTotal on May 14, 2026.

Findings (1)

The skill contains a critical shell injection vulnerability in `scripts/eliza-adapter.mjs`. The `BUZZ_TOKEN_INTELLIGENCE` action uses `child_process.execSync` to call `scripts/buzz-scan.mjs`, directly embedding user-controlled input (`message.content.text`) into the shell command string without proper sanitization or escaping. This allows an attacker to execute arbitrary commands on the host system by injecting shell metacharacters into the token name or address. While this is a severe vulnerability, there is no clear evidence of intentional malicious behavior (e.g., data exfiltration, persistence) designed into the skill itself, classifying it as suspicious rather than malicious.