Zerodha

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This is a coherent Zerodha CLI command router, but it handles brokerage credentials and can produce trading/order commands without an explicit approval checkpoint.

Install only if you are comfortable letting the agent help construct Zerodha CLI commands involving brokerage credentials and real trading actions. Do not let order placement, modification, cancellation, or credential setup run automatically; review every command carefully, especially commands containing API secrets or order details.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If a generated command is executed, it could place, modify, or cancel real brokerage orders.

Why it was flagged

The skill covers financial order-changing actions and only specifies missing-field validation for write actions; the artifact does not show a mandatory confirmation or approval step before producing an order command.

Skill content
Use when a user asks to ... place/modify/cancel orders...; ... Never guess missing required fields for write actions; ask for the missing values.
Recommendation

Require explicit user confirmation for every order-changing command, show a clear preview of account, symbol, side, quantity, price, and product, and avoid executing such commands automatically.

What this means

The agent/chat may handle high-value brokerage credentials, and generated commands may expose secrets in command history or process logs if copied and run directly.

Why it was flagged

The skill instructs the agent to handle brokerage API keys, API secrets, access tokens, and refresh-token-backed profiles, while the provided metadata declares no primary credential or required environment variables.

Skill content
`zerodha config profile add <profile_name> --api-key <key> --api-secret <secret> --set-active`; ... API data/order commands require an access token. ... CLI auto-refreshes access token when refresh token exists.
Recommendation

Declare credential requirements clearly, prefer secure prompts or keychain/env-based credential entry instead of command-line secrets, and warn users not to paste long-lived trading credentials into chat unless they understand the risk.

What this means

Running the installer gives remote script code access to the local machine during setup.

Why it was flagged

The documented installer executes remote GitHub scripts directly. This is a disclosed, user-directed setup path for the CLI, but it has typical remote-script provenance risk and is not represented by an install spec.

Skill content
`curl -fsSL https://raw.githubusercontent.com/jatinbansal1998/zerodha-kite-cli/main/scripts/install.sh | sh` ... `irm https://raw.githubusercontent.com/jatinbansal1998/zerodha-kite-cli/main/scripts/install.ps1 | iex`
Recommendation

Inspect the installer first, use a pinned release or commit if available, and avoid running pipe-to-shell or PowerShell `iex` installers unless the source is trusted.

What this means

API keys, API secrets, or login tokens may remain in the chat/session context while authentication is being completed.

Why it was flagged

The login flow asks the agent to retain sensitive auth inputs across messages during the task. This is limited to the login task, but it still places brokerage secrets in conversational context.

Skill content
Persist auth fields provided in earlier user messages during the same login task.
Recommendation

Prefer entering secrets directly into the trusted CLI when possible, avoid sharing long-lived credentials in chat, and clear or rotate credentials if they may have been exposed.