aster-bot-trading
Fail
Audited by Snyk on Apr 28, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.85). These URLs point to an unvetted GitHub repository and associated exchange API/domains which are not direct binaries but instruct you to run Node.js code that requires private keys and live-trading access—making them high-risk for credential or fund theft unless the repo/hosts and authors are independently verified.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill consumes public exchange data and API responses (WebSocket market data from wss://fstream.asterdex.com in src/ws/marketData.ts and REST calls to https://fapi.asterdex.com in src/execution/orderManager.ts and config), and those untrusted third‑party messages are parsed and directly drive trading signals and order placement, so they can materially influence the agent's actions.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly a trading bot for AsterDEX perpetual futures and contains concrete, purpose-built functions and API integrations to execute financial transactions. Evidence:
- src/execution/orderManager.ts implements placeOrder which signs requests with the API secret and POSTs to the exchange REST endpoint (/fapi/v1/order). This is direct order submission.
- setLeverage posts to /fapi/v1/leverage to change account leverage (manages margin settings/adusts risk).
- Configuration requires ASTER_API_KEY, ASTER_API_SECRET and TRADING_WALLET_PRIVATE_KEY and has a MODE=live switch that causes real orders to be placed (dry-run vs live).
- The code includes order parameter semantics (MARKET/LIMIT, BUY/SELL, quantity, price) and error handling for failed orders. These are specific, non-generic financial execution capabilities (sending transactions, modifying leverage) rather than generic tooling like a browser or HTTP client.
Issues (3)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata