Jupiter Prediction Market

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This appears to be a legitimate Jupiter prediction-market client, but it gives agents high-impact trading and position-management abilities without clear approval or risk-limit boundaries.

Install only if you intend to let an agent work with Jupiter Prediction Market data and trading workflows. Keep the API key private, require manual review/signature for every trade or position change, set strict exposure limits, and treat bulk close or automated trading actions as financially risky.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If connected to a valid API key and signing flow, an agent could initiate or prepare trades, cancellations, claims, or position-closing actions that affect the user's money.

Why it was flagged

The client exposes financial market mutation methods as simple API calls, including creating orders and closing all positions. In the skill's autonomous trading context, the artifacts do not define confirmation, budget, risk-limit, or rollback controls around these actions.

Skill content
async create(orderData) { return this.post('/orders', orderData); } ... async closeAllPositions(ownerPubkey) { return this.delete('/positions', { ownerPubkey }); }
Recommendation

Use only with explicit per-action user approval, wallet signature review, dry-run modes, and strict limits on order size, total exposure, and bulk position changes.

What this means

Anyone who obtains the API key may be able to use the user's Jupiter API access depending on the key's permissions.

Why it was flagged

The skill reads a Jupiter API key from an environment variable or stores it in config/api-key.json. This is expected for the Jupiter integration, but it is sensitive account access and should be declared and protected.

Skill content
if (process.env.JUPITER_API_KEY) { return process.env.JUPITER_API_KEY; } ... fs.writeFileSync(API_KEY_FILE, JSON.stringify({ jupiterApiKey: trimmedKey }, null, 2));
Recommendation

Prefer environment-secret storage, do not commit config/api-key.json, use least-privilege/revocable API keys, and ensure the registry metadata declares JUPITER_API_KEY.

What this means

The demo or market-manager path may fail to run, or may depend on local code outside the reviewed package if such files are later supplied.

Why it was flagged

This bundled module references local files that are not present in the provided manifest, creating an incomplete review/functionality gap. There is no evidence those missing files are automatically executed.

Skill content
const api = require('../api_client');
const { microUsdToUsd, calculateImpliedProbability, formatTimestamp } = require('../utils');
Recommendation

Avoid using the market_manager/demo path until the missing referenced modules are included and reviewed, or remove the stale references.