shredstream

Warn

Audited by Snyk on Mar 21, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly subscribes to and ingests pre-execution, user-generated Solana transactions from open third‑party endpoints (e.g., Jito Block Engine URL https://mainnet.block-engine.jito.wtf and Shyft RabbitStream endpoints like rabbitstream.ny.shyft.to) as shown in SKILL.md and the runtime scripts (scripts/parse_shredstream_entries.py and scripts/rabbitstream_monitor.py), and it parses those transactions/instructions to drive trading signals and downstream actions, so untrusted third‑party content can materially influence agent behavior.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (medium risk: 0.60). The prompt instructs running privileged operations (e.g., "sudo tcpdump"), requires firewall/network configuration (opening UDP port 20000, host-networked Docker) and other system-level deployment steps that request elevated privileges and modify machine/network state, even though it doesn't explicitly create users or edit system files.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 21, 2026, 02:36 PM
Issues
2