aicoin-freqtrade

Warn

Audited by Socket on May 9, 2026

3 alerts found:

AnomalySecurityx2
AnomalyLOW
scripts/ft.mjs

No clear evidence of intentional malware (no backdoor logic, credential theft, data exfiltration, or persistence beyond normal service restart). The main security risk in this module is operational hardening: execSync is used to run shell commands for file replacement (mv) and daemon restart (supervisorctl) using values derived from environment/container context. If an attacker can influence those environment-derived strings, command injection becomes plausible. Otherwise, the behavior aligns with a legitimate trading-daemon control CLI; ensure strong access control and parameter validation upstream for strategy/pairs/dry_run and any trading-force endpoints.

Confidence: 66%Severity: 52%
SecurityMEDIUM
SKILL.md

The skill is purpose-aligned and mostly routes data to expected local/official endpoints, so it does not look malicious. However, it has high operational risk because it can read local bot auth material and perform real trading-impact actions such as switching to live mode and forcing entries/exits; this makes it suspicious/high-risk as an agent capability rather than malware.

Confidence: 88%Severity: 74%
SecurityMEDIUM
scripts/ft-deploy.mjs

No clear embedded malware/backdoor in the snippet, but it contains high-risk behaviors: it executes a remote installer script via `curl ... | sh` (strong supply-chain risk) and uses execSync/run() with shell-interpolated strings from environment variables and CLI JSON params (command-injection risk). It also writes authentication secrets to an env file. This warrants security review/hardening even if intent is operational automation.

Confidence: 70%Severity: 82%
Audit Metadata
Analyzed At
May 9, 2026, 07:45 PM
Package URL
pkg:socket/skills-sh/aicoincom%2Faicoin-skills%2Faicoin-freqtrade%2F@b43a347792d0b4d840a962e9099ac0107a7ed447