saas-short-trader
Audited by Socket on Apr 4, 2026
2 alerts found:
AnomalySecurityThe code is a local, dynamic module loader followed by a small test harness that relies on an external local module (backtest_optimizer) for execution. While the harness itself appears benign, it introduces supply-chain risk: loading and executing code from a local scripts directory means any tampering or malicious content in backtest_optimizer could execute with the privileges of this process. There are no hardcoded credentials or network calls visible here, but the dynamic import is a potential attack surface. If the scripts directory is trusted and integrity-checked, the code is low risk; otherwise, hardening is advised (e.g., verify module hashes, avoid broad sys.path manipulation, sandbox the importer). Additionally, avoid relying on asserts for critical runtime checks in production builds and implement explicit error handling and input validation for the callback data.
SUSPICIOUS/HIGH-RISK skill: its capabilities are mostly aligned with its stated purpose, but that purpose is itself high impact. The main concern is autonomous real-world trading with scheduled execution and no per-order human confirmation in live mode. Install/data flows are largely same-org and not overtly malicious, so this is not confirmed malware, but it is a high-risk financial automation skill that should only run with strong user oversight.