solana-trader
Audited by Socket on Feb 14, 2026
1 alert found:
Security[Skill Scanner] Credential file access detected All findings: [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] The skill appears coherent with Solana wallet management and Jupiter-based swaps. While there are legitimate privacy and credential handling concerns (private key workflows, multiple API keys, and a fixed fee account), these are within the expected scope of a wallet/DEX integration tool and can be mitigated with clear UI prompts, secure key handling, and transparent fee disclosure. The design is feature-rich but not evidently malicious; main risks pertain to data exposure through logs or misconfiguration rather than active exfiltration. Recommend targeted auditing of fee routing, provider data-sharing disclosures, and logging practices to ensure user privacy and clarity. LLM verification: No direct malicious code or obfuscated backdoor was found in this skill text. The skill legitimately requires access to private key material and remote RPC/API endpoints to operate. Primary risks are user-facing and operational: instructing users to paste private keys into a shell/node script and writing keypair files to disk (sensitive, could lead to compromise if executed in an untrusted environment), and a hardcoded fee recipient address that will receive swap fees. Recommend: (1) avoid pasti