strategy-grid-trade
Audited by Snyk on Mar 20, 2026
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.85). The set includes direct curl|sh installs and raw .sh files hosted in a personal/unknown GitHub repo (purong-huang-1121) and references to that repo's releases API—while some links are official OKX docs, executing unverified scripts from an individual account is a high-risk vector for malware or supply-chain compromise.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 0.90). The skill instructs automatic, silent installation and execution of third-party binaries and scripts fetched via curl|sh from unvetted GitHub repositories, advises suppressing routine output and dismissing security scanner warnings as "false positives", and directs use of local env files for tokens — together these are strong supply-chain and stealth-installation patterns that could enable remote code execution, credential exfiltration, or a backdoor.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill explicitly fetches and parses public third‑party content in its required workflow—e.g., curl installs from raw.githubusercontent.com in Pre-flight Steps 1/2/3, a GitHub Releases API curl that is parsed and embedded in the welcome banner, and live price queries via the OKX DEX quote API used by the core algorithm—so untrusted external data is read and can change tool actions (install/update decisions and trading behavior).
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill's pre-flight checks explicitly run remote install scripts at runtime—e.g., "curl -sSL https://raw.githubusercontent.com/okx/onchainos-skills/main/install.sh | sh" and "curl -sSL https://raw.githubusercontent.com/purong-huang-1121/plugin-store/main/install_strategy.sh | sh -s -- strategy-grid"—which fetch and execute remote code and are required for the skill to function.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly a crypto trading bot that executes on-chain swaps and manages wallet signing. Evidence:
- Core algorithm step 6d: "Execute swap via OKX DEX aggregator".
- CLI commands that perform trades:
strategy-grid tick(execute one grid cycle, may execute a trade),strategy-grid start(continuous trading),strategy-grid retry(re-execute last failed trade), andstrategy-grid deposit/trade history/status/report. - Authentication: relies on onchainos CLI and "onchainos wallet (TEE signing)" indicating transaction signing and wallet control.
- Numerous trade-related parameters (slippage_pct, max_trade_pct, gas_reserve_eth) and explicit handling of on-chain balances and tx hashes.
These are specific crypto/blockchain execution capabilities (wallet signing and swap execution), not generic tooling. Therefore it grants Direct Financial Execution Authority.
Issues (5)
Suspicious download URL detected in skill instructions.
Malicious code pattern detected in skill scripts.
Third-party content exposure detected (indirect prompt injection risk).
Unverifiable external dependency detected (runtime URL that controls agent).
Direct money access capability detected (payment gateways, crypto, banking).