hydra-strategy

Warn

Audited by Snyk on Apr 15, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The scanner (scripts/hydra-scanner.py) calls external MCP tools via hydra_config.mcporter_call("market_get_prices") and mcporter_call("leaderboard_get_markets") to ingest public market and leaderboard (third‑party/user‑sourced) data and directly uses those results to score and trigger trading actions, so untrusted external content can materially influence agent decisions.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly a trading strategy that creates and manages live positions. It requires and configures a wallet (runtime.yaml, config/hydra-config.json), refers to a plugin runtime that “handles everything” including DSL exits, and includes runtime commands (openclaw senpi runtime create/list/status) and a bootstrap that "Set wallet and telegram in runtime.yaml" and installs a trading runtime. It specifies leverage, max positions, entries/day, cooldowns and banned assets and enforces exits via the DSL/plugin. These are specific, purpose-built financial execution capabilities (crypto/derivatives trading with wallet integration and automated order/position management), not generic tooling. Therefore it grants direct financial execution authority.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 15, 2026, 05:12 PM
Issues
2