taiko-shadow
Audited by Socket on Mar 3, 2026
1 alert found:
Obfuscated FileThe artifact documents legitimate but sensitive functionality: creating deterministic L1 deposit addresses, funding them, generating ZK proofs, and claiming on Taiko L2. I found no explicit malicious code patterns in the provided fragment (no hard-coded credentials, no remote malicious domains, no remote-exec). However, the documentation omits critical security controls around secret management, server authentication, and persistence of task metadata. Running the server mode or automated pipelines without those controls materially increases the chance of secret compromise or unauthorized fund transfers. Recommend treating the project as high-risk until secure key-handling and server hardening practices are documented and enforced.