lulo

Warn

Audited by Snyk on Apr 19, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.80). The skill makes runtime requests to https://api.lulo.fi (e.g., /v1/generate.transactions.deposit and /v1/generate.transactions.withdraw) to fetch base64-serialized transactions that are deserialized, signed, and submitted — meaning remote content directly controls executable transaction instructions at runtime.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill explicitly provides on-chain financial execution capabilities. It defines API endpoints to "generate deposit transaction" (POST /v1/generate.transactions.deposit) and "generate withdrawal transaction" (POST /v1/generate.transactions.withdraw) that return serialized transactions, and the documentation includes concrete TypeScript and Python examples that deserialize, sign with a private key/wallet, and send those transactions to the Solana network. It also lists supported tokens (USDC, USDT, SOL, etc.), shows blink/action endpoints that execute lending actions, and includes a SolanaAgentKit example (agent.methods.lendAssets) to perform lending. These are specific crypto/blockchain transaction tools to move funds, so this qualifies as Direct Financial Execution.

Issues (2)

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 19, 2026, 05:06 PM
Issues
2