LP Agent

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This skill matches its LP-trading purpose, but it asks for wallet private keys, can run automated on-chain trading, installs unpinned infrastructure, and creates default admin credentials.

Only install this if you understand Hummingbot and Solana LP risks. Use a dedicated low-balance wallet, change default credentials before adding any wallet, verify the API is local and protected, pin or review the cloned Hummingbot API code, and require manual confirmation before any strategy opens or closes positions.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the API is reachable by another local process or exposed beyond localhost, default credentials could allow unauthorized control of trading operations.

Why it was flagged

The deployment script creates predictable default credentials for the Hummingbot API and broker, which are used to control trading infrastructure and wallets.

Skill content
USERNAME=admin
PASSWORD=admin
CONFIG_PASSWORD=admin
...
BROKER_USERNAME=admin
BROKER_PASSWORD=password
Recommendation

Change all default passwords immediately, bind services only to trusted interfaces, and avoid adding funded wallets until authentication is hardened.

What this means

A wallet private key controls funds; entering it gives the local trading stack authority to use that wallet for on-chain transactions.

Why it was flagged

The wallet-add flow prompts for a Solana private key and sends it to the configured Hummingbot API/Gateway endpoint.

Skill content
private_key = getpass.getpass("Enter private key (base58): ")
...
data = {
    "chain": args.chain,
    "private_key": private_key,
}
...
api_request("POST", "/accounts/gateway/add-wallet", data)
Recommendation

Use a dedicated low-balance trading wallet, verify the API URL is trusted and local, and do not paste a main wallet or seed phrase.

What this means

The code executed during deployment can change over time and was not fully captured by this skill review.

Why it was flagged

The installer clones and later updates a remote repository without pinning a commit or release before running its Makefile/deployment commands.

Skill content
REPO_URL="https://github.com/hummingbot/hummingbot-api.git"
...
git clone "$REPO_URL" "$INSTALL_DIR"
...
make setup
...
make deploy
...
git pull
Recommendation

Pin the Hummingbot API repository to a reviewed tag or commit, review the cloned files before deployment, and avoid automatic upgrades without review.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

This can persistently change how later commands invoking sudo behave in that environment.

Why it was flagged

The install script can create a replacement sudo executable in a system path when running as root.

Skill content
if [ "$(id -u)" = "0" ] && ! command -v sudo &>/dev/null; then
    echo -e '#!/bin/bash\nwhile [[ "$1" == *=* ]]; do export "$1"; shift; done\nexec "$@"' > /usr/local/bin/sudo
    chmod +x /usr/local/bin/sudo
fi
Recommendation

Avoid running this installer as root on a normal host, review this behavior before use, and prefer a contained environment such as a disposable VM or container.

What this means

Misconfigured parameters or unintended execution can move funds, incur transaction fees, or create impermanent-loss exposure.

Why it was flagged

The skill is designed to operate automated LP strategies that can open, rebalance, and close on-chain positions.

Skill content
**Run strategies** — Auto-rebalancing LP controller or single-position executor
...
`run-strategy` — Run, monitor, and manage LP strategies
Recommendation

Require explicit user confirmation for every wallet addition, strategy creation, amount, price range, and stop/close action.