ranger-finance
Warn
Audited by Snyk on Apr 20, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The documentation explicitly instructs to git clone and run the MCP server from https://github.com/ranger-finance/ranger-agent-kit.git (git clone https://github.com/ranger-finance/ranger-agent-kit.git ... then python -m ranger_mcp), which fetches and executes remote code that the AI-agent integration relies on to expose tools—meeting the criteria for a runtime external dependency that executes remote code.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly a perpetual futures trading SDK for Solana and exposes functions to execute market actions: getOrderMetadata (quotes), increasePosition, decreasePosition, closePosition, and executeTransaction. It shows signing with a wallet private key and environment variables (WALLET_PRIVATE_KEY) and lists MCP tools like sor_increase_position / sor_decrease_position / sor_close_position for AI agents. These are specific, purpose-built APIs to place and sign on-chain trades (i.e., move/allocate funds and open/close positions), so it grants direct financial execution capability.
Issues (2)
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata