polymarket-signal-sniper
Warn
Audited by Snyk on Mar 15, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's signal_sniper.py (fetch_rss and run_scan) explicitly fetches user-configurable public RSS feeds (from SIMMER_SNIPER_FEEDS or the --feed flag, e.g., news.google.com/rss), parses titles/summaries, and directly uses that untrusted, third‑party content to infer trade direction and drive SDK trade actions, so external content can materially influence agent behavior.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill fetches RSS feeds at runtime (e.g., https://news.google.com/rss/search?q=greenland) and directly uses article content to drive trading decisions, so externally-hosted feed content can immediately control the agent's actions.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly designed to monitor signals and execute trades on Polymarket. It includes a documented SDK/API (base URL, portfolio/positions endpoints), commands to "Execute real trades" (e.g., python signal_sniper.py --live), an example trade flow showing "Execute: BUY YES $25", and references to signing orders via WALLET_PRIVATE_KEY (the SDK signs orders automatically when this env var is present). These are specific, built-in market-order and wallet/signing capabilities — i.e., direct financial execution.
Issues (3)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata