Scan Report
5 /100
tradingview-screener
Screen markets across 6 asset classes using TradingView data
A clean, legitimate market data screening tool with no security concerns. All capabilities match documentation, expression sandboxing is properly implemented, and no sensitive operations are performed.
Safe to install
This skill is safe to use. No action required.
Findings 1 items
| Severity | Finding | Location |
|---|---|---|
| Low | Expression validation uses keyword blocklist Sensitive Access | scripts/signal_types.py:22 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | READ | ✓ Aligned | Reads YAML config files only |
| Network | NONE | READ | ✓ Aligned | tvscreener library makes public API calls |
| Shell | NONE | NONE | — | No shell execution found |
| Environment | NONE | NONE | — | No environment variable access |
File Tree
19 files · 59.6 KB · 2145 lines Markdown 5f · 1032L
Python 7f · 881L
YAML 4f · 166L
Shell 1f · 51L
JSON 1f · 11L
Text 1f · 4L
├─
▾
assets
│ └─
signal-template.yaml
YAML
├─
▾
references
│ ├─
computed-signals-guide.md
Markdown
│ ├─
field-presets.md
Markdown
│ ├─
strategy-templates.md
Markdown
│ └─
tvscreener-api-guide.md
Markdown
├─
▾
scripts
│ ├─
▾
tests
│ │ ├─
__init__.py
Python
│ │ ├─
test_screen.py
Python
│ │ └─
test_signal_engine.py
Python
│ ├─
requirements.txt
Text
│ ├─
screen.py
Python
│ ├─
screener_constants.py
Python
│ ├─
signal_engine.py
Python
│ └─
signal_types.py
Python
├─
▾
state
│ └─
▾
signals
│ ├─
golden-cross.yaml
YAML
│ ├─
oversold-bounce.yaml
YAML
│ └─
volume-breakout.yaml
YAML
├─
_meta.json
JSON
├─
install.sh
Shell
└─
SKILL.md
Markdown
Dependencies 4 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
tvscreener | >=0.2.0 | pip | No | Public TradingView API wrapper |
pandas | >=2.0.0 | pip | No | Standard data analysis library |
pyyaml | >=6.0 | pip | No | Uses yaml.safe_load for YAML parsing |
pytest | >=7.0.0 | pip | No | Development dependency only |
Security Positives
✓ No credential harvesting or environment variable access
✓ No shell execution or subprocess calls
✓ No file writes to sensitive paths
✓ No base64 encoding or obfuscation
✓ Expression validation with blocked keywords and df.eval() sandboxing
✓ Clean, documented market data operations only
✓ No external data exfiltration
✓ Proper test coverage validates behavior