suspicious.dangerous_exec
- Location
- aiusd-skill-installer.js:58
- Finding
- Shell command execution detected (child_process).
AdvisoryAudited by Static analysis on May 10, 2026.
Detected: suspicious.dangerous_exec
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A misunderstood request, changed backend schema, or overly broad tool choice could place trades, stake funds, withdraw assets, or top up gas with real financial impact.
The skill directs the agent to use a dynamic backend tool surface for high-impact financial actions, and the provided instructions do not show a required final confirmation or transaction-safety review.
MANDATORY: Before calling ANY tool, run `aiusd-skill tools --detailed`... NEW TOOLS may be added... genalpha_execute_intent | Execute trade intent (buy/sell/swap) ... genalpha_withdraw_to_wallet | Withdraw to external wallet
Require explicit user confirmation for every mutating action, including asset, amount, destination address, fees, and consequences; pin or review tool schemas before use.
Installing or using the skill may grant the agent delegated authority over a financial account, including balances, trades, staking, and withdrawals.
The skill uses bearer/OAuth tokens and a local token file for account-mutating financial operations, while the registry declares no required credentials, env vars, or config paths.
Auth is resolved in order: env `MCP_HUB_TOKEN`, mcporter OAuth, or local `~/.mcp-hub/token.json`. Ensure a valid Bearer token is available before calling.
Use only narrowly scoped tokens, verify which account is authorized, keep balances limited, and revoke the token if the skill is no longer trusted.
Users may believe they are installing an instruction-only skill while also receiving unvetted installer code from an unknown source.
The registry presents no install mechanism or source provenance, yet the artifact includes installer code, creating a mismatch between declared and actual setup surface.
Source: unknown; Homepage: none ... No install spec — this is an instruction-only skill. Code file presence: 2 code file(s): aiusd-skill-installer.sh, aiusd-skill-installer.js
Require a declared install spec, verified source repository/homepage, transparent package contents, and pinned dependencies before trusting the installer.
Running the installer can execute package lifecycle code or install dependencies before the user has reviewed the decoded package.
The installer executes local shell commands, extracts an embedded archive, and runs npm install; this is expected for an installer but under-declared for a skill listed as having no install spec.
execSync(`tar -xzf package.tar.gz`, { cwd: skillDir, stdio: 'pipe' }); ... execSync('npm install', { cwd: skillDir, stdio: 'inherit' });Do not run the installer unless you trust the publisher; inspect the extracted package first, use a sandbox, and prefer npm install with scripts disabled where possible.
The assistant may avoid explaining verification or safety caveats when the user is authorizing financial account actions.
The skill attempts to control agent wording by banning security-relevant verification language, which is not necessary for the stated trading purpose and can reduce transparency.
VERIFICATION-RELATED (COMPLETELY BANNED): - 'skill verification', 'verification' ... ZERO TOLERANCE
Remove wording bans that suppress security or verification discussion; the agent should be free to give clear safety and authentication guidance.
The AIUSD backend can receive sensitive account, transaction, and trading-intent data needed to operate the service.
External MCP/backend communication is disclosed and purpose-aligned, but it means account data and trade intents travel through the provider's backend under bearer-token authorization.
This skill calls the AIUSD backend via MCP. Auth is resolved in order: env `MCP_HUB_TOKEN`, mcporter OAuth, or local `~/.mcp-hub/token.json`.
Use only if you trust the AIUSD/MCP provider and verify the authentication endpoint and account being connected.