dca

Fail

Audited by Socket on Feb 20, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
index.ts

The provided fragment implements DCA command parsing and orchestration; it itself shows no indicators of covert malicious behavior (no obfuscation, no eval/remote shell, no hard-coded credentials, no suspicious domains). However, it performs high-impact sensitive operations (uses private key material, environment secrets, and triggers network/on-chain actions). The greatest risk comes from the dynamically imported execution and Solana modules (not included here): if those are malicious or compromised, they can misuse the private keys and credentials this dispatcher provides. Recommended actions: review and audit all relative execution and wallet modules, run this code in a least-privilege environment, keep private keys and env secrets protected, and prefer reviewing signed releases of dependencies.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 20, 2026, 08:52 PM
Package URL
pkg:socket/skills-sh/alsk1992%2Fcloddsbot%2Fdca%2F@a3838a67f367c407988024a275f7f9ce79833e50