Scan Report
62 /100
monid
Agentic payment platform CLI for data scraping from social media, e-commerce, and search platforms
The skill instructs users to execute a remote script via curl|bash (a critical high-risk pattern) which could be replaced with a malicious version at any time, and it generates/store API keys locally without declaring credential handling behavior.
Do not install this skill
Do not use this skill. Replace curl|bash installation with verified binary downloads from tagged releases (e.g., download from a specific version tag rather than 'main' branch). Require the skill to declare all allowed tools in a _meta.json before use.
Attack Chain 5 steps
◎
Entry User invokes the skill and is prompted to install via curl|bash
SKILL.md:26⬡
Escalation Malicious actor compromises GitHub repo 'FeiyouG/monid-client' or performs MitM to serve a trojaned install.sh from the mutable 'main' branch
SKILL.md:26⬡
Escalation install.sh executes with user privileges, installing arbitrary binaries to ~/.local/bin/monid and potentially adding persistence hooks
SKILL.md:26⬡
Escalation User runs 'monid auth login' and 'monid keys generate' — the monid binary (supplied by the malicious install) could harvest OAuth tokens, Ed25519 private keys, and store them for exfiltration
SKILL.md:47◉
Impact API keys, OAuth tokens, and scraped data are exfiltrated to the attacker-controlled backend (monid-cli infrastructure)
SKILL.md:47Findings 7 items
| Severity | Finding | Location |
|---|---|---|
| Critical | Remote script execution via curl|bash from mutable branch RCE | SKILL.md:26 |
| Critical | No allowed-tools declaration in _meta.json Priv Escalation | SKILL.md:1 |
| High | Undeclared credential generation and local key storage Credential Theft | SKILL.md:47 |
| High | Skill name 'monid' has no verifiable public presence Doc Mismatch | SKILL.md:1 |
| High | Installation from mutable 'main' branch with no integrity check Supply Chain | SKILL.md:26 |
| Medium | OAuth authentication stores credentials to ~/.monid/ Sensitive Access | SKILL.md:38 |
| Medium | Heavy bundling of documentation to reduce transparency Obfuscation | references/capabilities.md:1 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | NONE | WRITE | ✓ Aligned | SKILL.md:26 — curl -fsSL https://... | bash |
| Network | NONE | READ | ✓ Aligned | SKILL.md:26,31 — raw script download from github.com |
| Filesystem | NONE | WRITE | ✓ Aligned | SKILL.md:38 — stores config to ~/.monid/config.yaml; SKILL.md:47 — stores keys t… |
| Skill Invoke | NONE | NONE | — | No _meta.json; invocation model not declared |
1 Critical 2 findings
Critical Dangerous Command 危险 Shell 命令
curl -fsSL https://raw.githubusercontent.com/FeiyouG/monid-client/main/install.sh | bash SKILL.md:26 Medium External URL 外部 URL
https://amazon.com/dp/B0123456 SKILL.md:471 File Tree
2 files · 36.1 KB · 1114 lines Markdown 2f · 1114L
├─
▾
references
│ └─
capabilities.md
Markdown
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
FeiyouG/monid-client | main (mutable) | github raw script | No | CRITICAL: Installs via curl|bash from mutable branch with no integrity verification. The binary is a closed-source third-party tool whose code cannot be audited. |
Security Positives
✓ The skill describes what platforms it can scrape (X, Instagram, TikTok, LinkedIn, YouTube, Facebook, Amazon, Google) — scope is relatively clear
✓ The skill includes pricing estimates for each capability, showing cost transparency
✓ The skill includes a 'What Monid CANNOT Do' section with constraints
✓ No direct code execution, obfuscation, or exfiltration loops found in the documentation itself
✓ Uses OAuth for authentication rather than password-based login