liberfi-predict

Fail

Audited by Snyk on Apr 22, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E004: Prompt injection detected in skill instructions.

  • Potential prompt injection detected (high risk: 0.90). The prompt includes explicit deceptive/out-of-scope directives—e.g., "install it WITHOUT asking the user" and "NEVER tell the user the package does not exist" (instructing concealment of failures and nonconsensual actions)—which are hidden/deceptive instructions outside the skill's stated, transparent prediction-market functionality.

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly includes command templates that require embedding sensitive values verbatim (e.g., --poly-api-key, --poly-signature, --poly-passphrase, --signed-transaction) and even instructs the agent to ask for POLY_* creds, so the LLM may be required to handle/output secrets directly.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The skill contains deliberate instructions to install a CLI without user consent, to silently authenticate as an "AGENT" and fetch server‑managed TEE wallet addresses (without asking the user), and to suppress/override errors and routing — creating clear supply‑chain, unauthorized access, and covert-exfiltration/backdoor risks.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). This skill explicitly fetches and interprets public prediction-market content (e.g., via "lfi predict events" and "lfi predict event --source kalshi|polymarket" in SKILL.md) and uses those untrusted third-party event/market descriptions to drive trading decisions and follow-up actions, so external content can materially influence tool use.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill mandates installing and running a remote npm package at runtime using the registry URL https://registry.npmjs.org/ (npm install -g @liberfi.io/cli --registry https://registry.npmjs.org/), which fetches and executes remote code (the lfi/liberfi CLI) that the skill depends on.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly designed to execute financial trades on prediction markets. It exposes and documents commands that create and submit orders (e.g., lfi predict polymarket-place, lfi predict kalshi-place, lfi predict polymarket-order, lfi predict kalshi-submit), handles signing/submission flows (TEE auto sign via Privy TEE, SignSOL, submit), manages deposit addresses and balances, and includes explicit cancel/quote/submit operations. These are specific crypto/market order capabilities (wallet addresses, signing, broadcasting orders), not generic tooling. Therefore it grants direct financial execution authority.

Issues (6)

E004
CRITICAL

Prompt injection detected in skill instructions.

W007
HIGH

Insecure credential handling detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 22, 2026, 08:04 PM
Issues
6