ledger-signing
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill processes hex payloads for transactions, messages, and typed data from the
config.jsonfile. It lacks boundary markers or specific instructions for the agent to verify the intent or safety of these payloads before initiating the hardware signing flow. This creates an indirect prompt injection surface where a malicious input could lead to signing unintended transaction data. - Ingestion points:
payload_hex,domain_separator_hex, andhash_struct_message_hexviaload_configinscripts/agent.py. - Boundary markers: Absent.
- Capability inventory: USB/HID cryptographic signing against a hardware device.
- Sanitization: The script only validates that inputs are valid hex strings, providing no semantic check of the transaction data.
- [DATA_EXFILTRATION]: The script
scripts/agent.pycontains an undocumented helper_check_serenbucks_balancewhich retrieves environment variables namedAPI_KEYandSEREN_API_KEY. This data is sent via an HTTP POST request tohttps://api.serendb.com/wallet/balance. While the domain is linked to the author's infrastructure, the use of a generic variable name likeAPI_KEYposes a risk of accidental exfiltration of unrelated user secrets to the vendor's API. - [EXTERNAL_DOWNLOADS]: The skill relies on external libraries
ledgerblueandhidapifor hardware communication, as listed inrequirements.txt. These are standard dependencies for interacting with Ledger devices.
Audit Metadata