stock-data-assistant
Fail
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The file
references/picoclaw_config_example.yamlcontains a hardcoded API key (sk-d2d0dc36-f065-46ed-a897-0ddcbd0046eb) for the Haihub service. - [EXTERNAL_DOWNLOADS]:
setup_picoclaw.shfetches thepicoclawbinary from Sipeed's official GitHub repository releases. - [COMMAND_EXECUTION]:
start_wechat_bridge.shandsetup_picoclaw.shexecute shell commands to install and run the downloaded binary, manage system processes, and launch Python scripts. - [DATA_EXPOSURE]:
generate_picoclaw_config.pyreads sensitive environment variables (OPENAI_API_KEY) and stores them in a plain-text configuration file at.local/picoclaw.yaml. - [PROMPT_INJECTION]: The skill uses the WeChat channel to ingest untrusted user messages which are then processed by an LLM to invoke tool calls.
- Ingestion points: WeChat message interface as described in
SKILL.md. - Boundary markers: None present in the orchestration scripts.
- Capability inventory: Access to 76+ stock data MCP tools and market data subscriptions via
picoclawandstart_wechat_bridge.sh. - Sanitization: No sanitization or validation of the WeChat input is implemented in the provided shell or Python wrappers.
Recommendations
- AI detected serious security threats
Audit Metadata