Scan Report
5 /100
Bitpanda v2
Skill per Gestione Portafoglio - retrieves wallet balances, trades, and prices from Bitpanda API
Legitimate Bitpanda portfolio management skill with no security issues - uses curl/jq for API calls and only communicates with the official bitpanda.com API.
Safe to install
This skill is safe to use. All behavior aligns with the documentation.
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | NONE | — | No file operations in implementation |
| Network | READ | READ | ✓ Aligned | Only calls https://api.bitpanda.com |
| Shell | WRITE | WRITE | ✓ Aligned | Uses curl for API calls, documented in SKILL.md |
| Environment | READ | READ | ✓ Aligned | Reads BITPANDA_API_KEY, documented in SKILL.md |
| Skill Invoke | NONE | NONE | — | No skill chaining |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | NONE | NONE | — | No browser automation |
| Database | NONE | NONE | — | No database access |
4 findings
Medium External URL 外部 URL
https://developers.bitpanda.com/ SKILL.md:22 Medium External URL 外部 URL
https://developer.bitpanda.com/ SKILL.md:135 Medium External URL 外部 URL
https://stedolan.github.io/jq/ SKILL.md:184 Medium External URL 外部 URL
https://api.bitpanda.com scripts/bitpanda.sh:11 File Tree
2 files · 14.7 KB · 521 lines Shell 1f · 270L
Markdown 1f · 251L
├─
▾
scripts
│ └─
bitpanda.sh
Shell
└─
SKILL.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
curl | system | system | No | Standard CLI tool for HTTP requests |
jq | system | system | No | Standard CLI tool for JSON parsing |
Security Positives
✓ All network requests go to legitimate bitpanda.com API only
✓ No credential exfiltration - API key is used locally to authenticate requests
✓ No obfuscation or base64 encoding detected
✓ No hidden functionality - code matches documentation
✓ Clear error handling without suspicious error message patterns
✓ No file system writes or reads to sensitive paths
✓ No reverse shell, C2, or data theft capabilities
✓ Pagination is implemented safely with loop limits
✓ Dependencies (curl, jq) are standard system tools, not malicious packages