lulo
Warn
Audited by Snyk on Apr 19, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The skill makes runtime requests to https://api.lulo.fi (e.g., /v1/generate.transactions.deposit and /v1/generate.transactions.withdraw) to fetch base64-serialized transactions that are deserialized, signed, and submitted — meaning remote content directly controls executable transaction instructions at runtime.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill explicitly provides on-chain financial execution capabilities. It defines API endpoints to "generate deposit transaction" (POST /v1/generate.transactions.deposit) and "generate withdrawal transaction" (POST /v1/generate.transactions.withdraw) that return serialized transactions, and the documentation includes concrete TypeScript and Python examples that deserialize, sign with a private key/wallet, and send those transactions to the Solana network. It also lists supported tokens (USDC, USDT, SOL, etc.), shows blink/action endpoints that execute lending actions, and includes a SolanaAgentKit example (agent.methods.lendAssets) to perform lending. These are specific crypto/blockchain transaction tools to move funds, so this qualifies as Direct Financial Execution.
Issues (2)
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata