dca
Audited by Socket on Feb 20, 2026
1 alert found:
Obfuscated FileThe provided fragment implements DCA command parsing and orchestration; it itself shows no indicators of covert malicious behavior (no obfuscation, no eval/remote shell, no hard-coded credentials, no suspicious domains). However, it performs high-impact sensitive operations (uses private key material, environment secrets, and triggers network/on-chain actions). The greatest risk comes from the dynamically imported execution and Solana modules (not included here): if those are malicious or compromised, they can misuse the private keys and credentials this dispatcher provides. Recommended actions: review and audit all relative execution and wallet modules, run this code in a least-privilege environment, keep private keys and env secrets protected, and prefer reviewing signed releases of dependencies.