polymarket-maker-rebate-bot
Audited by Socket on Apr 9, 2026
1 alert found:
AnomalyThis file itself is not overtly malicious: there is no obfuscation, no hardcoded credentials, and no direct attempts to exfiltrate arbitrary host data. However it intentionally executes a local agent (agent.py) with arguments provided by a remote polling service, and then sends the agent's stdout/stderr back to that service. That design creates a supply-chain / remote-control risk: a malicious or compromised orchestrator (polymarket_live endpoints) can instruct runners to perform unwanted or destructive actions (e.g., cause agent.py to run in live mode, point it at arbitrary config or data files, or cause reads of local files whose contents might appear in stdout and be exfiltrated). The most realistic threat is misuse by a trusted-looking central service or compromise of that service or package dependencies rather than this script secretly containing malware. Recommend treating the orchestration service and agent.py as high-trust components: add validation/whitelisting of payload fields, restrict allowable file paths, and avoid sending full stdout/stderr contents back without redaction if sensitive data may appear.