Is densmirnov/solvera safe?

https://github.com/openclaw/skills/tree/main/skills/densmirnov/solvera

79
CAUTION

The densmirnov/solvera skill is technically clean — three markdown files with no executable code, a clean installation making only expected GitHub connections, and all canary files intact with no exfiltration detected. However, two structural runtime risks warrant caution: the API response protocol embeds a free-text next_steps.description field that the solvera.markets operator controls on every call, creating a persistent server-side prompt injection channel; and the skill's recommended agent loop enables fully autonomous on-chain financial operations with real ERC-20 tokens without requiring per-action user approval, meaning a compromised or malicious API could direct the agent toward fund-draining transactions. These risks are design properties of the DeFi marketplace integration pattern rather than evidence of malicious intent by the skill author.

Category Scores

Prompt Injection 60/100 · 30%
Data Exfiltration 80/100 · 25%
Code Execution 97/100 · 20%
Clone Behavior 93/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 40/100 · 5%

Findings (7)

HIGH Server-side prompt injection via next_steps response field -30

Every API response from solvera.markets includes a next_steps array containing a free-text description field. The SKILL.md instructs the agent to act on these steps, creating a persistent server-controlled injection channel. The skill operator — or anyone who compromises the solvera.markets API — can inject arbitrary natural-language instructions into the agent at runtime on every API call. The agent has no mechanism to distinguish legitimate operational guidance from injected commands. This is a classic indirect prompt injection pattern embedded by design into the API protocol.

MEDIUM Token allowlist undefined — delegated to agent's own judgment -10

The minimum safe filter section requires the agent to verify 'tokenOut is in your allowlist' before submitting offers, but the SKILL.md does not define or constrain this allowlist in any way. The agent must independently determine which tokens are acceptable. This creates a decision boundary the server could manipulate: a malicious intent could list a token near the edge of what an agent might accept, leading to bond loss, failed fulfillment, or reputation damage. In a multi-skill context, a malicious skill could poison the agent's token allowlist.

HIGH Autonomous on-chain financial execution with no per-action approval gate -60

The recommended agent loop instructs the agent to autonomously and continuously poll for open intents, submit competitive offers (with real bond at stake), monitor for selection, and fulfill obligations by executing on-chain transactions — all without any explicit per-action user approval requirement. Combined with the next_steps injection vector, a compromised or malicious solvera.markets API could manipulate intent parameters (inflated minAmountOut, malicious verifier addresses, shortened TTLs creating urgency), inject fulfillment instructions via next_steps descriptions, or list honeypot intents designed to drain solver bonds. The loop is designed to run continuously, amplifying any server-side manipulation.

MEDIUM Financial behavior and on-chain identity exposed to API operator -20

The skill requires the agent to transmit wallet addresses (payer, initiator, solver), token contract addresses, fulfillment amounts, and transaction calldata to solvera.markets. While private keys are explicitly kept local (a positive control), the API operator gains full visibility into the agent's on-chain identity, financial capacity, and behavior patterns. The reputation endpoint (GET /api/reputation/:address) additionally links solver performance history to wallet identity, which could be used to profile or target specific agents.

LOW No executable code present in skill files -3

The skill consists of three files: SKILL.md (markdown API documentation), README.md (user-facing documentation), and _meta.json (metadata). No JavaScript, TypeScript, Python, shell scripts, Makefile, npm package.json, git hooks, git submodules, or symlinks were found. The code execution attack surface is confined entirely to what an agent does at runtime when it calls the solvera.markets API.

LOW Clean installation; network activity limited to GitHub and Ubuntu infrastructure -7

Installation performed a sparse git clone from github.com/openclaw/skills.git, extracted the skill subdirectory, and cleaned up the temporary clone. Network connections observed: 140.82.121.3:443 (GitHub), 91.189.91.49:443 and 185.125.188.x:443 (Ubuntu package/snap infrastructure, background). Notably absent: any connection to solvera.markets during install. Filesystem changes were confined to /home/oc-exec/skill-under-test/. No unexpected process spawning beyond standard git toolchain.

INFO Explicit private key protection guidance (positive control) 0

The skill includes an explicit safety requirement instructing agents never to transmit private keys to the API, and the write endpoint documentation clarifies that all POST endpoints return calldata only and do not sign or broadcast. This is the correct tx-builder pattern for safe wallet integration and represents a genuine positive security control.