Scan Report
15 /100
storyclaw-alpaca-trading
US stock and crypto trading via Alpaca API with paper trading and real trading support
Legitimate trading skill with minor documentation gaps and inconsistent credential handling patterns that don't constitute malicious behavior.
Safe to install
Document all scripts in SKILL.md, prefer environment variable usage over JSON file storage for credentials, and add explicit permission declarations for shell execution.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Low | Undocumented strategy scripts Doc Mismatch | scripts/aggressive-strategy.js:1 |
| Low | Inconsistent credential handling Sensitive Access | scripts/momentum-strategy.js:19 |
| Info | Plaintext credential storage Sensitive Access | credentials/example.json:1 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ | READ | ✓ Aligned | config-loader.js:32 - reads credentials/{USER_ID}.json |
| Network | READ | READ | ✓ Aligned | trading.js:60-95 - HTTPS requests to Alpaca API |
| Shell | NONE | WRITE | ✗ Violation | aggressive-strategy.js:13 - execSync('node trading.js ...') |
| Environment | READ | READ | ✓ Aligned | config-loader.js:18 - reads USER_ID/TELEGRAM_USER_ID |
4 findings
Medium External URL 外部 URL
https://paper-api.alpaca.markets SKILL.md:35 Medium External URL 外部 URL
https://data.alpaca.markets SKILL.md:36 Medium External URL 外部 URL
https://api.alpaca.markets SKILL.md:40 Medium External URL 外部 URL
https://app.alpaca.markets/brokerage/new-account SKILL.md:96 File Tree
7 files · 34.8 KB · 1154 lines JavaScript 4f · 1037L
Markdown 1f · 105L
JSON 2f · 12L
├─
▾
credentials
│ └─
example.json
JSON
├─
▾
scripts
│ ├─
aggressive-strategy.js
JavaScript
│ ├─
config-loader.js
JavaScript
│ ├─
momentum-strategy.js
JavaScript
│ └─
trading.js
JavaScript
├─
config.example.json
JSON
└─
SKILL.md
Markdown
Security Positives
✓ All network requests go to legitimate Alpaca API endpoints (paper-api.alpaca.markets, data.alpaca.markets)
✓ No base64 encoding, obfuscation, or anti-analysis techniques detected
✓ No credential exfiltration or external data transfer observed
✓ No sensitive paths (~/.ssh, ~/.aws, .env) accessed
✓ No reverse shell, C2, or reverse engineering indicators
✓ Clean codebase with no suspicious patterns