jupiter
Warn
Audited by Snyk on May 15, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's required workflow (SKILL.md and references/integration-patterns.md Pattern 1 & Pattern 6) explicitly fetches and ingests public Jupiter API responses (e.g., /swap/v2/order and /execute), external token metadata/off‑chain content (Arweave/IPFS via DAS), and real‑time LaserStream/WebSocket feeds, then deserializes and acts on those results (signing/submitting transactions and driving trading decisions), which clearly exposes the agent to untrusted third‑party content that can influence actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.70). The skill instructs embedding Jupiter's remote JavaScript (e.g., https://plugin.jup.ag/plugin-v1.js or dynamic import('@jup-ag/plugin')), which is fetched and executed at runtime to provide the swap widget and therefore represents a required runtime dependency that executes remote code in the application's environment.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly designed for crypto financial operations on Solana. It documents Jupiter Swap API (token swaps), Jupiter Trigger (limit orders), Jupiter Recurring (DCA), Jupiter Lend (deposit/borrow), Perps (open long/short positions), and Jupiter Plugin for embedded swaps. It also requires transaction submission via Helius Sender (including submission rules like skipPreflight, fee handling, Jito tips) and references MCP tools for submitting and monitoring transactions (getSenderInfo, getPriorityFeeEstimate, parseTransactions, transactionSubscribe, laserstreamSubscribe, etc.). These are concrete APIs and flows for creating, signing, and submitting on-chain financial transactions — i.e., directly moving or managing funds. Therefore it grants Direct Financial Execution Authority.
Issues (3)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata