Trust Assessment
solana-whale-alert received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 8 findings: 5 critical, 2 high, 0 medium, and 1 low severity. Key findings include Remote code execution: curl/wget pipe to shell, Node lockfile missing, Command Injection via sleep interval.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Static Code Analysis layer scored lowest at 0/100, indicating areas for improvement.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings8
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Remote code execution: curl/wget pipe to shell Detected a pattern that downloads and immediately executes remote code. This is a primary malware delivery vector. Never pipe curl/wget output directly to a shell interpreter. | Static | skills/satoshi891102/solana-whale-alert/scripts/scan-holders.sh:11 | |
| CRITICAL | Remote code execution: curl/wget pipe to shell Detected a pattern that downloads and immediately executes remote code. This is a primary malware delivery vector. Never pipe curl/wget output directly to a shell interpreter. | Static | skills/satoshi891102/solana-whale-alert/scripts/watch-wallet.sh:16 | |
| CRITICAL | Remote code execution: curl/wget pipe to shell Detected a pattern that downloads and immediately executes remote code. This is a primary malware delivery vector. Never pipe curl/wget output directly to a shell interpreter. | Static | skills/satoshi891102/solana-whale-alert/scripts/watch-wallet.sh:39 | |
| CRITICAL | Remote code execution: curl/wget pipe to shell Detected a pattern that downloads and immediately executes remote code. This is a primary malware delivery vector. Never pipe curl/wget output directly to a shell interpreter. | Static | skills/satoshi891102/solana-whale-alert/scripts/whale-check.sh:12 | |
| CRITICAL | Remote code execution: curl/wget pipe to shell Detected a pattern that downloads and immediately executes remote code. This is a primary malware delivery vector. Never pipe curl/wget output directly to a shell interpreter. | Static | skills/satoshi891102/solana-whale-alert/scripts/whale-check.sh:19 | |
| HIGH | Command Injection via sleep interval The `INTERVAL` variable, which is directly derived from user input (`$2`), is used without sanitization in the `sleep` command. An attacker can inject shell metacharacters (e.g., `;`, `&`, `|`) into the `INTERVAL` argument to execute arbitrary commands on the system running the skill. Sanitize or validate the `INTERVAL` variable to ensure it contains only numeric values before passing it to `sleep`. For example, use `printf '%d' "$INTERVAL" 2>/dev/null || INTERVAL=60` to ensure it's an integer, or use a more robust validation function. | LLM | scripts/watch-wallet.sh:14 | |
| HIGH | Command Injection via Python code interpolation The `MIN_SOL` variable, which is directly derived from user input (`$1`), is interpolated without sanitization into a Python script string (`MIN_LAMPORTS = $MIN_SOL * 1_000_000_000`). An attacker can inject arbitrary Python code into the `MIN_SOL` argument, leading to execution of malicious Python commands within the `python3 -c` interpreter. Pass user-provided values to the Python script as arguments (e.g., `python3 -c 'import sys; MIN_LAMPORTS = int(sys.argv[1]) * 1_000_000_000' "$MIN_SOL"`) instead of direct string interpolation. This prevents arbitrary code execution. | LLM | scripts/whale-check.sh:20 | |
| LOW | Node lockfile missing package.json is present but no lockfile was found (package-lock.json, pnpm-lock.yaml, or yarn.lock). Commit a lockfile for deterministic dependency resolution. | Dependencies | skills/satoshi891102/solana-whale-alert/package.json |
Scan History
Embed Code
[](https://skillshield.io/report/c5f206afa52831c9)
Powered by SkillShield