io.github.WarTech9/clawswap
Cross-chain swaps between Solana and Base for AI agents paid for via via x402 micropayments.
Security Findings2
2 findings detected across 1 severity level. Each finding includes a structured evidence chain answering: WHAT, WHERE, WHY, HOW CONFIDENT, and HOW TO VERIFY.
What Was Found
Untrusted data entry point identified. A external content source at server:io.github.WarTech9/clawswap introduces data into the processing pipeline without adequate boundary controls. The observed input pattern is Server name "io.github.WarTech9/clawswap" contains "aws".
Server name impersonates an official vendor namespace, misleading AI clients and users
Potential impact: Cross-Agent Attack Propagation. If exploited, an attacker could compromise ai client and agent context. Exploitability is assessed as trivial — no special conditions required.
Where in the Code
The data flow traverses 2 locations from entry point to dangerous operation. The data passes through 1 intermediate transformation before reaching the sink, each of which could have applied sanitization but did not.
Why This Is Dangerous
Cross-Agent Attack Propagation. AI trusts server "io.github.WarTech9/clawswap" as official aws product due to namespace match
Confidence Assessment
This finding has been assigned a confidence score of 50% (low-moderate). Confidence reflects the strength of the evidence chain: higher values indicate that the finding was confirmed through multiple independent analysis techniques (e.g., AST-based taint tracking, structural pattern matching, or cross-reference with known CVEs). Lower values indicate the finding is based on heuristic patterns that may require manual verification.
Confidence factors: The following analysis signals contributed to the final confidence score. Positive adjustments indicate corroborating evidence; negative adjustments indicate uncertainty or partial mitigation.
Direct substring match: "aws" in server name
How to Verify
The following verification steps enable independent confirmation of this finding. Each step can be performed by a security reviewer, compliance auditor, or automated tooling to validate that the identified vulnerability exists and assess whether remediation has been applied.
server:io.github.WarTech9/clawswapVerify whether "io.github.WarTech9/clawswap" is an official aws server
Server uses "aws" namespace but GitHub URL does not match
What Was Found
Untrusted data entry point identified. A external content source at server:io.github.WarTech9/clawswap introduces data into the processing pipeline without adequate boundary controls. The observed input pattern is Server name "io.github.WarTech9/clawswap" contains "github".
Server name impersonates an official vendor namespace, misleading AI clients and users
Potential impact: Cross-Agent Attack Propagation. If exploited, an attacker could compromise ai client and agent context. Exploitability is assessed as trivial — no special conditions required.
Where in the Code
The data flow traverses 2 locations from entry point to dangerous operation. The data passes through 1 intermediate transformation before reaching the sink, each of which could have applied sanitization but did not.
Why This Is Dangerous
Cross-Agent Attack Propagation. AI trusts server "io.github.WarTech9/clawswap" as official github product due to namespace match
Confidence Assessment
This finding has been assigned a confidence score of 50% (low-moderate). Confidence reflects the strength of the evidence chain: higher values indicate that the finding was confirmed through multiple independent analysis techniques (e.g., AST-based taint tracking, structural pattern matching, or cross-reference with known CVEs). Lower values indicate the finding is based on heuristic patterns that may require manual verification.
Confidence factors: The following analysis signals contributed to the final confidence score. Positive adjustments indicate corroborating evidence; negative adjustments indicate uncertainty or partial mitigation.
Direct substring match: "github" in server name
How to Verify
The following verification steps enable independent confirmation of this finding. Each step can be performed by a security reviewer, compliance auditor, or automated tooling to validate that the identified vulnerability exists and assess whether remediation has been applied.
server:io.github.WarTech9/clawswapVerify whether "io.github.WarTech9/clawswap" is an official github server
Server uses "github" namespace but GitHub URL does not match
Security Category Deep Dive
Select a category to explore sub-categories, findings, and compliance coverage.