integrating-jupiter

Warn

Audited by Snyk on Apr 20, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill's "Fresh Context Policy" explicitly requires fetching external docs/OpenAPI specs at runtime and treating them as the source of truth—e.g., https://dev.jup.ag/openapi-spec/ultra/ultra.yaml—which means remote content would directly control the agent's instructions.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly a Jupiter crypto integration: it documents swap/quote endpoints (Ultra Swap GET /order -> POST /execute), order/limit/recurring endpoints (Trigger /createOrder + /execute, Recurring /createOrder + /execute), lending endpoints that return unsigned VersionedTransactions (/earn/deposit, /earn/withdraw), send endpoints (/craft-send, /craft-clawback), and other market/order endpoints (prediction markets /orders). The prompt even includes a signAndSend implementation (signing VersionedTransaction with a Keypair and sending to RPC). These are specific crypto transaction/asset operations (swaps, sends, order execution, signing), i.e. direct financial execution capability.

Issues (2)

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 20, 2026, 06:05 AM
Issues
2