integrating-jupiter
Warn
Audited by Snyk on Feb 17, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The skill's "Fresh Context Policy" requires fetching runtime docs/specs (e.g. https://dev.jup.ag/docs/ultra/index.md and https://dev.jup.ag/openapi-spec/ultra/ultra.yaml) and instructs the agent to treat fetched content as authoritative and follow it, so these external URLs can directly control the agent's prompts/behavior at runtime.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly a Jupiter crypto integration: it documents swap/quote endpoints (Ultra Swap GET /order -> POST /execute), order/limit/recurring endpoints (Trigger /createOrder + /execute, Recurring /createOrder + /execute), lending endpoints that return unsigned VersionedTransactions (/earn/deposit, /earn/withdraw), send endpoints (/craft-send, /craft-clawback), and other market/order endpoints (prediction markets /orders). The prompt even includes a signAndSend implementation (signing VersionedTransaction with a Keypair and sending to RPC). These are specific crypto transaction/asset operations (swaps, sends, order execution, signing), i.e. direct financial execution capability.
Audit Metadata