pumpfun

Warn

Audited by Socket on Feb 20, 2026

1 alert found:

Security
SecurityMEDIUM
index.ts

This module provides many read-only API helpers (low risk) and also includes flows that require loading a local Solana keypair and signing VersionedTransaction objects returned by a remote endpoint. The most significant security risk is the design that posts the user's public key to a remote 'trade-local' endpoint (default https://pumpportal.fun/api/trade-local or an env override) and blindly deserializes, signs, and broadcasts the transaction bytes returned. If the remote endpoint (or the domain's DNS/HTTPS chain) is compromised, an attacker can construct malicious transactions (transfer funds, set authorities, approve token allowances, etc.) and have the user sign them. This is a high-impact supply-chain/network risk. Additional lower risks include fetching arbitrary images (possible SSRF when run in privileged environments) and uploading user-supplied metadata. Recommendations: require explicit user confirmation and transaction inspection before signing; avoid signing transactions returned verbatim from remote services without client-side verification; restrict and validate PUMPFUN_LOCAL_TX_URL and ensure TLS/DNS security; keep private keys out of easily compromised envs. No direct evidence the code is itself malware, but its transaction-signing pattern represents a potentially dangerous trust model.

Confidence: 85%Severity: 78%
Audit Metadata
Analyzed At
Feb 20, 2026, 08:54 PM
Package URL
pkg:socket/skills-sh/alsk1992%2Fcloddsbot%2Fpumpfun%2F@9c4be22f127c1519a1c0b6e85f4a3c4266478903