Fía Signals

PassAudited by VirusTotal on May 11, 2026.

Findings (1)

The `scripts/fia_signals.sh` file contains a critical shell injection vulnerability. User-supplied arguments (e.g., `CHAIN`, `SYM`, `ADDR`) are directly interpolated into the `curl` command string without proper sanitization or quoting. This allows an attacker to inject arbitrary shell commands by crafting specific input, leading to potential Remote Code Execution (RCE) on the agent's system. For example, `fia_signals.sh dd 'BTC; malicious_command'` would execute `malicious_command`. While this is a severe flaw, there is no clear evidence of intentional malicious behavior (e.g., data exfiltration, persistence, or unauthorized remote control) designed by the skill's author, thus classifying it as suspicious rather than malicious.