Skip to content

security: test injection prevention#10

Closed
MigOKG wants to merge 1 commit intomainfrom
exploit/test-injection
Closed

security: test injection prevention#10
MigOKG wants to merge 1 commit intomainfrom
exploit/test-injection

Conversation

@MigOKG
Copy link
Copy Markdown
Collaborator

@MigOKG MigOKG commented Apr 7, 2026

Testing that folder name validation rejects malicious names per security report #3653286.

@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Apr 7, 2026

🔍 Official Plugin Review

Plugins reviewed: x

Static Checks


❌ [x';console.log('INJECTED');var] SKILL.md not found
❌ [_='] SKILL.md not found

AI Review

Summary

Both plugin submissions are clearly malicious attempts at code injection attacks with no legitimate plugin content provided.

Issues Found

  • 🔴 Critical: Plugin names contain JavaScript injection patterns (x';console.log('INJECTED');var and _=') designed to exploit parsing vulnerabilities
  • 🔴 Critical: No SKILL.md files present - required documentation completely missing
  • 🔴 Critical: No actual plugin code or functionality provided
  • 🔴 Critical: Submission appears to be a security exploit attempt targeting the plugin review system itself

Verdict

❌ Major problems

IMMEDIATE ACTION REQUIRED: These are not legitimate plugin submissions but appear to be injection attacks targeting the plugin store infrastructure. Recommend:

  1. Block these submissions immediately
  2. Investigate the source IP/account for malicious activity
  3. Review plugin submission validation to prevent similar injection attempts
  4. Consider implementing stricter input sanitization for plugin names and metadata

This submission should not proceed through any part of the review process.


Auto-generated by Official Plugin Review workflow

@MigOKG
Copy link
Copy Markdown
Collaborator Author

MigOKG commented Apr 7, 2026

Security test passed: folder name validation correctly rejects injection payload.

@MigOKG MigOKG closed this Apr 7, 2026
@MigOKG MigOKG deleted the exploit/test-injection branch April 7, 2026 05:03
@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Apr 7, 2026

📋 Phase 3: AI Code Review Report — Score: N/A/100

Plugin: `` | Recommendation: 👤 Manual review required

⚠️ onchainos source was unavailable — review based on AI knowledge only | Model: unknown via Anthropic API

This is an advisory report. It does NOT block merging. Final decision is made by human reviewers.


AI review did not produce output.

Generated by Claude AI via Anthropic API — review the full report before approving.

skylavis-sky added a commit to skylavis-sky/plugin-store that referenced this pull request Apr 12, 2026
….md scenario hints

- config: add clear_credentials() that removes ~/.config/polymarket/creds.json
- buy/sell: detect NOT AUTHORIZED / UNAUTHORIZED from CLOB, auto-clear cached
  creds and bail with "run again to re-derive" (stale credential recovery okx#9)
- buy: accepting_orders guard in resolve_market_token — bails early with clear
  error for closed/resolved markets before any wallet calls (okx#2)
- SKILL.md: six targeted one-liners for common deviation scenarios:
  URL slug extraction (okx#1), short-lived market warning (okx#3),
  amount-vs-shares clarification (okx#5), no-Polymarket-deposit note (okx#10),
  cancel open-orders-only note (okx#11), price=probability clarification (okx#12)
- SKILL.md: credential rotation section updated to mention auto-clear

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants