Skip to main content

integrations

Facilitates management of external data sources and custom connectors for trading bots, enhancing data integration capabilities.

Install this skill

or
17/100

Security score

The integrations skill was audited on Feb 22, 2026 and we found 27 security issues across 4 threat categories. Review the findings below before installing.

Categories Tested

Security Issues

medium line 120

Template literal with variable interpolation in command context

SourceSKILL.md
120console.log(`Webhook URL: ${source.url}`);
medium line 136

Template literal with variable interpolation in command context

SourceSKILL.md
136'Authorization': `Bearer ${process.env.MY_API_KEY}`,
medium line 187

Template literal with variable interpolation in command context

SourceSKILL.md
187console.log(`Signal: ${data.signal} ${data.symbol}`);
medium line 188

Template literal with variable interpolation in command context

SourceSKILL.md
188console.log(`Confidence: ${data.confidence}`);
medium line 197

Template literal with variable interpolation in command context

SourceSKILL.md
197console.log(`[${source}] ${JSON.stringify(data)}`);
medium line 209

Template literal with variable interpolation in command context

SourceSKILL.md
209console.log(`${meeting.date}: ${meeting.probabilities}`);
medium line 224

Template literal with variable interpolation in command context

SourceSKILL.md
224console.log(`Status: ${status.status}`); // 'healthy' | 'degraded' | 'error'
medium line 225

Template literal with variable interpolation in command context

SourceSKILL.md
225console.log(`Last fetch: ${status.lastFetch}`);
medium line 226

Template literal with variable interpolation in command context

SourceSKILL.md
226console.log(`Last error: ${status.lastError}`);
medium line 227

Template literal with variable interpolation in command context

SourceSKILL.md
227console.log(`Fetch count: ${status.fetchCount}`);
medium line 228

Template literal with variable interpolation in command context

SourceSKILL.md
228console.log(`Error count: ${status.errorCount}`);
low line 28

Webhook reference - potential data exfiltration

SourceSKILL.md
28/integrations add webhook "my-signals" Add custom webhook source
medium line 88

Webhook reference - potential data exfiltration

SourceSKILL.md
88### Add Custom Webhook Source
low line 91

Webhook reference - potential data exfiltration

SourceSKILL.md
91// Add webhook to receive custom signals
low line 92

Webhook reference - potential data exfiltration

SourceSKILL.md
92const source = await integrations.addWebhook({
low line 96

Webhook reference - potential data exfiltration

SourceSKILL.md
96// Webhook config
low line 97

Webhook reference - potential data exfiltration

SourceSKILL.md
97path: '/webhooks/my-signals',
low line 98

Webhook reference - potential data exfiltration

SourceSKILL.md
98secret: process.env.WEBHOOK_SECRET,
low line 120

Webhook reference - potential data exfiltration

SourceSKILL.md
120console.log(`Webhook URL: ${source.url}`);
low line 121

Webhook reference - potential data exfiltration

SourceSKILL.md
121// POST to: https://your-domain.com/webhooks/my-signals
medium line 255

Webhook reference - potential data exfiltration

SourceSKILL.md
255| **webhook** | External signals pushed to you | Instant |
low line 308

Webhook reference - potential data exfiltration

SourceSKILL.md
308MY_SIGNALS_WEBHOOK_SECRET=your-secret
medium line 316

Webhook reference - potential data exfiltration

SourceSKILL.md
3161. **Validate incoming data** — Use schemas for webhooks
low line 98

Access to .env file

SourceSKILL.md
98secret: process.env.WEBHOOK_SECRET,
low line 136

Access to .env file

SourceSKILL.md
136'Authorization': `Bearer ${process.env.MY_API_KEY}`,
low line 121

External URL reference

SourceSKILL.md
121// POST to: https://your-domain.com/webhooks/my-signals
low line 133

External URL reference

SourceSKILL.md
133url: 'https://api.example.com/prices',
Scanned on Feb 22, 2026
View Security Dashboard