jaguar-strategy

Warn

Audited by Snyk on May 15, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The scanner (scripts/jaguar-scanner.py) calls cfg.mcporter_call("leaderboard_get_markets", ...) to fetch external leaderboard/market data and then parses those fields to decide and invoke create_position (mcporter_call "create_position"), meaning untrusted/public market data is ingested at runtime and can directly change tool actions.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly a trading strategy that interfaces with on-chain positions and a runtime that manages position creation and exits. It references create_position, a position_tracker that "auto-detects position opens/closes on-chain", setting a "strategy wallet address" in runtime.yaml, and CLI commands (openclaw senpi runtime create, openclaw senpi dsl positions / inspect) used to install and manage the trading runtime. These are concrete blockchain/crypto trading controls (wallet address, on-chain positions, position creation/exit) — not generic automation — and therefore constitute direct financial execution capability.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
MEDIUM
Analyzed
May 15, 2026, 10:51 AM
Issues
2