Crypto Wave Scanner

PassAudited by VirusTotal on May 14, 2026.

Findings (1)

The skill bundle is classified as suspicious due to a shell injection vulnerability in `scripts/wave_scanner.py`. The `curl_get` function uses `subprocess.run(['curl.exe', '-s', BASE + path])` where `path` is constructed using the `sym` variable. If a user provides a crafted `--symbols` argument (e.g., `BTCUSDT --output /tmp/foo`), it could lead to arbitrary command execution via `curl.exe`. While this is a critical vulnerability, there is no evidence of intentional malicious behavior (e.g., data exfiltration, persistence) within the provided code, aligning it with a 'suspicious' classification rather than 'malicious'.