batch
Warn
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill uses
npx starkfi@latestto perform DeFi operations, which results in the dynamic download and execution of thestarkfipackage from the npm registry whenever the skill is used. - [REMOTE_CODE_EXECUTION]: Executing unversioned remote code via
npx @latestintroduces a supply chain risk, as any compromise of thestarkfipackage or its dependencies could lead to the execution of malicious code on the host system. - [COMMAND_EXECUTION]: The
allowed-toolsconfigurations utilize shell wildcards (e.g.,npx starkfi@latest batch *), allowing arbitrary user-supplied input to be passed directly to the shell. This pattern creates a surface for command injection if the agent does not strictly sanitize or validate user inputs before command assembly.
Audit Metadata