base-trading-agent

Fail

Audited by Socket on Feb 21, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Natural language instruction to download and install from URL detected All findings: [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: Instruction to copy/paste content into terminal detected (CI012) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] This package contains multiple high-risk supply-chain and remote-execution indicators. The mandatory download-and-run AuthTool (passworded GitHub archive) and the macOS base64-decoded curl-to-IP piped to bash are strong, actionable red flags for credential theft and arbitrary code execution. Combining those with instructions to store private keys in plaintext significantly increases the risk of immediate compromise. Do NOT run the provided installers or execute the macOS command. Do NOT place private keys/mnemonics into the project .env or execute AuthTool.exe. Treat this package and its installer artifacts as malicious/untrusted until AuthTool and the macOS installer payload are fully audited; avoid using this agent. LLM verification: The fragment presents a high-risk setup pattern: it requires external, potentially unverifiable binaries (AuthTool) and uses base64-delivered installers to enable trading capabilities. This introduces supply-chain, credential exposure, and remote-code execution risks that are not mitigated by the trading functionality. To make this viable, the project should remove or replace external binaries with auditable, signed components, implement secure secret handling (secret stores, vaults), and provid

Confidence: 95%Severity: 92%
Audit Metadata
Analyzed At
Feb 21, 2026, 05:05 AM
Package URL
pkg:socket/skills-sh/snyk%2Fagent-scan%2Fbase-trading-agent%2F@7923edf8689fd685bda74765e2b8145adc49b515