ibkr-trading
Warn
Audited by Snyk on Mar 12, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The setup scripts download and install remote, executable components at runtime—notably https://download2.interactivebrokers.com/portal/clientportal.gw.zip (which is unzipped and its run.sh is executed) and the pip-installed ibeam package from PyPI—so external content is fetched and executed and is required for the skill to run.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly designed to perform trading on a brokerage (Interactive Brokers) and includes concrete, non-generic APIs and examples to execute market orders. It documents authentication (IBeam + IBKR Key 2FA), account/positions endpoints, and a direct "Place Orders" curl POST to /v1/api/iserver/account/{accountId}/orders with orderType, side (BUY), quantity, etc. Those elements constitute specific tools for placing market orders and managing trading activity (i.e., moving financial assets), not generic tooling. Therefore it grants direct financial execution capability.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.70). The skill explicitly instructs installing system packages with sudo and starting system-level components (Java, Chrome/ChromeDriver, Xvfb, gateway), which require elevated privileges and modify the machine's state, so it should be flagged.
Issues (3)
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata