polymarket-signal-sniper

Warn

Audited by Snyk on Mar 15, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's signal_sniper.py (fetch_rss and run_scan) explicitly fetches user-configurable public RSS feeds (from SIMMER_SNIPER_FEEDS or the --feed flag, e.g., news.google.com/rss), parses titles/summaries, and directly uses that untrusted, third‑party content to infer trade direction and drive SDK trade actions, so external content can materially influence agent behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill fetches RSS feeds at runtime (e.g., https://news.google.com/rss/search?q=greenland) and directly uses article content to drive trading decisions, so externally-hosted feed content can immediately control the agent's actions.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly designed to monitor signals and execute trades on Polymarket. It includes a documented SDK/API (base URL, portfolio/positions endpoints), commands to "Execute real trades" (e.g., python signal_sniper.py --live), an example trade flow showing "Execute: BUY YES $25", and references to signing orders via WALLET_PRIVATE_KEY (the SDK signs orders automatically when this env var is present). These are specific, built-in market-order and wallet/signing capabilities — i.e., direct financial execution.

Issues (3)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 15, 2026, 06:40 PM
Issues
3