可信 — 风险评分 5/100
上次扫描:1 天前 重新扫描
5 /100
polymarket-48h-player-prop-consistency-trader
Trades NBA player prop mispricings on Polymarket by detecting cross-stat consistency or divergence
Legitimate NBA player prop trading bot using the simmer-sdk for Polymarket, with safe paper-trading defaults and comprehensive documentation.
技能名称polymarket-48h-player-prop-consistency-trader
分析耗时25.5s
引擎pi
可以安装
This skill is safe to use. The only minor recommendation is to pin the simmer-sdk version in a requirements.txt for reproducible builds.

安全发现 1 项

严重性 安全发现 位置
低危
Unpinned dependency version 供应链
The skill declares simmer-sdk as a dependency but does not specify a version constraint. This could lead to unexpected behavior if the package is updated.
"pip": ["simmer-sdk"]
→ Consider pinning to a specific version (e.g., simmer-sdk>=1.0.0,<2.0.0) for reproducible builds.
clawhub.json:5
资源类型声明权限推断权限状态证据
文件系统 NONE NONE No file operations in code
网络访问 READ READ ✓ 一致 Uses simmer-sdk to query Polymarket API for market data
命令执行 NONE NONE No shell execution found
环境变量 READ READ ✓ 一致 Reads SIMMER_API_KEY and tunables from env; uses locally for API auth
技能调用 NONE NONE No skill invocation code present
剪贴板 NONE NONE No clipboard access
浏览器 NONE NONE No browser automation
数据库 NONE NONE No database access

目录结构

3 文件 · 26.2 KB · 702 行
Python 1f · 494L Markdown 1f · 121L JSON 1f · 87L
├─ 📋 clawhub.json JSON 87L · 1.8 KB
├─ 📝 SKILL.md Markdown 121L · 5.4 KB
└─ 🐍 trader.py Python 494L · 18.9 KB

依赖分析 1 项

包名版本来源已知漏洞备注
simmer-sdk * pip Version not pinned; declared in clawhub.json

安全亮点

✓ Paper trading is the default mode (venue="sim"), eliminating financial risk by default
✓ Real trading requires explicit --live flag
✓ Autostart and cron are disabled by default (autostart: false, cron: null)
✓ Documentation comprehensively describes all functionality with no mismatches
✓ No shell execution, subprocess, or system calls
✓ No obfuscation, base64 encoding, or anti-analysis techniques
✓ No credential exfiltration - API key is used locally for Polymarket auth only
✓ No network calls to suspicious IPs or domains
✓ Clean code structure with proper input validation
✓ Risk parameters are tunable through declared environment variables