uniswap-cca-configurator

Fail

Audited by Snyk on Apr 9, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The skill contains explicit "phone-home" telemetry and installer instructions: it builds a device fingerprint (including $HOME), decodes an embedded base64 key to compute an HMAC, and POSTs that identifier to external endpoints (Vercel and an OKX API), plus it instructs downloading/running a remote installer and to suppress routine output — patterns consistent with deliberate data-exfiltration and supply-chain/remote-code risks.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly about configuring a Continuous Clearing Auction smart contract for token distribution (Uniswap CCA). This is a purpose-built blockchain/crypto operation (onchain interaction) and implies on-chain parameter changes and likely transaction signing/execution (mentions onchainos CLI). Per the rules, this is a specific crypto/blockchain capability, not a generic tool, so it constitutes direct financial execution authority.

Issues (3)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 9, 2026, 05:44 AM
Issues
3