OpcodeOpcode
OverviewReportsVerifyPricing
Submit a project →
Opcode
Security Audit Report

Neuro AI

External Review · TG-2026-0006 · v1
84
PASS
Published April 2, 2026

Executive Summary

Nuero (nuero.chat) is an AI-powered agent on Solana that enables shopping, travel booking, token swaps, and payments — all using USDC. The platform launched in late March 2026 with a pump.fun token ($NUERO) and has grown to 797 holders and 1,214 registered users within its first week.

The external review found no malicious code, drainer scripts, or hidden wallet interactions across both public and authenticated pages. The frontend communicates only with legitimate services (Privy for authentication, Supabase for backend, WalletConnect for wallet discovery, Google Fonts for typography). Authentication is handled through Privy's industry-standard email OTP system with embedded wallet creation — a secure, well-established approach. The product is functional: the AI chat interface works, settings collect shipping information for e-commerce orders, and deposit/withdraw/trade interfaces are accessible.

The two scored findings are missing security headers (Content-Security-Policy and X-Frame-Options), which leave the site vulnerable to XSS injection and clickjacking attacks. These are configuration-level fixes that can be addressed in minutes via Next.js config or Cloudflare dashboard. On the token side, mint and freeze authorities are permanently revoked, and the deployer has no rug history (single launch). However, significant bundle activity was detected at launch (46+ wallets buying in coordinated same-slot transactions), and the deployer is actively extracting pump.fun fees and converting them to USDC. The team behind Nuero is anonymous — no doxxed founders or verifiable team information is available. These token-level observations are provided as context for traders but do not affect the security score, which reflects product safety only.

Rug Risk Assessment

Mint Authority
revoked
Mint authority is None. Token2022 program (TokenzQdBNbLqP5VEhdkAS6EPFLC1PHnBqCXEpPxuEb). No new tokens can be minted.
Freeze Authority
revoked
Freeze authority is None. No wallet can be frozen by the token creator.
Upgrade Authority
not_applicable
Pump.fun token — no on-chain program with upgrade authority. Token operates through the immutable Token2022 program.
LP Status
not_applicable
Token trades on pump.fun bonding curve. Standard automated market maker for pump.fun launches.
Holder Concentration
Top 10: 32%
797 total holders. Top wallet holds 10.07% (ApakgD368htq...), top 5 hold 23.98%, top 10 hold 31.81%. Deployer wallet (4TQo...) holds 0 tokens. No single wallet exceeds common concentration thresholds outside top 2.
Bundle Activity
detected
46+ unique wallets bought in coordinated same-slot transactions within the first 10 blocks after token creation. Slot 409921027 had 9 buys, slot 409921025 had 6 buys, slot 409921022 had 5 buys. Each wallet used a different fee payer — consistent with sniper bot activity rather than a single-actor bundle. Deployer bought 100M tokens (10% supply) in the creation transaction.

Audit Scope

Scope ItemStatusNotes
Frontend security (public pages)complete6 pages tested via Playwright — homepage, chat login, demos, token page, support, about. All pages screenshotted and analyzed.
Frontend security (authenticated)completeLogged in via Privy OTP (solmelting@gmail.com). Tested chat interface, dashboard, settings, portfolio. Captured network requests — 0 suspicious.
Security headerscompleteHTTP response headers analyzed via curl. HSTS, X-Content-Type-Options, Referrer-Policy present. CSP and X-Frame-Options missing.
Network request analysiscomplete283 requests (public) + 176 requests (authenticated) intercepted. External domains: Google Fonts, WalletConnect, Privy, Supabase. 0 suspicious requests.
Drainer/phishing detectioncompleteNo drainer scripts, setApprovalForAll patterns, clipboard hijacking, or data exfiltration detected in public or authenticated states.
Twitter/social analysiscompleteOperator-assisted. @useNuero verified account, joined March 2026, 621 followers, 47 posts. Engagement mixed — some organic, some low-quality bot replies.
Domain analysiscompletenuero.chat resolves to 185.158.133.1. Cloudflare CDN. .chat TLD WHOIS limited — registrar data not publicly exposed.
On-chain authority checkscompleteMint and freeze authority both revoked. Token2022 program. Supply: 998,452,882.55 NUERO.
Holder analysiscompleteFull paginated analysis via Helius getTokenAccounts — 797 holders across 1 page. Top 10 concentration: 31.81%.
Deployer analysiscompleteDeployer 4TQoKzwi... identified via first transaction. 1 token launch only (this one). Currently collecting pump.fun fees and converting to USDC via Jupiter swaps.
Bundle detectioncompleteFirst 50 transactions analyzed. 46+ unique buyers in 10 slots. Coordinated same-slot buying detected across multiple slots.
Methodology: This audit was performed using TrenchGuard's AI-assisted review process with human oversight.

Findings (5)

IDSeverityTitle
TG-001mediumMissing Content-Security-Policy header
TG-002mediumMissing X-Frame-Options header
TG-003infoClean external dependency chain
TG-004infoPrivy authentication — industry standard
TG-005infoNo drainer or phishing behavior detected
TG-001 · configurationmedium
Missing Content-Security-Policy header

The website does not set a Content-Security-Policy (CSP) HTTP response header. CSP is a critical defense against cross-site scripting (XSS) attacks. Without it, if an attacker finds any injection point, they can load and execute arbitrary JavaScript from any domain. For a site that handles financial transactions (deposits, withdrawals, token swaps) and collects PII (shipping addresses, phone numbers), this is a meaningful gap. Cloudflare and Next.js both support CSP configuration.

HTTP response headers — nuero.chat

# Current headers (missing CSP):
strict-transport-security: max-age=31536000; includeSubDomains
referrer-policy: strict-origin-when-cross-origin
x-content-type-options: nosniff
# Missing: content-security-policy
# Missing: x-frame-options
Remediation

Add a Content-Security-Policy header via next.config.js headers() or Cloudflare dashboard. Recommended starting policy: default-src 'self'; script-src 'self' 'unsafe-inline' https://auth.privy.io; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com; font-src 'self' https://fonts.gstatic.com; connect-src 'self' https://auth.privy.io https://*.supabase.co https://explorer-api.walletconnect.com; frame-src https://auth.privy.io;

TG-002 · configurationmedium
Missing X-Frame-Options header

The website does not set an X-Frame-Options HTTP response header. This allows the site to be embedded in iframes on any domain, enabling clickjacking attacks. An attacker could overlay Nuero's deposit or swap interfaces with invisible elements on a malicious site, tricking users into initiating transactions they didn't intend.

HTTP response headers — nuero.chat

Remediation

Add X-Frame-Options: DENY (or SAMEORIGIN if iframing is needed internally) via next.config.js headers() or Cloudflare dashboard. Also add frame-ancestors 'none' to the CSP header for defense in depth.

TG-003 · frontendinfo
Clean external dependency chain

All external domains contacted by the site are legitimate and expected: Google Fonts (typography), WalletConnect Explorer API (wallet connection), Privy (authentication), Supabase (backend database). No unexpected third-party scripts, analytics trackers, or ad networks were detected in either public or authenticated states.

TG-004 · frontendinfo
Privy authentication — industry standard

Authentication is handled via Privy (privy.io), a well-established Web3 auth provider. Login uses email OTP via an isolated iframe (auth.privy.io). Embedded wallets are created by Privy — user keys are managed by Privy's infrastructure, not by Nuero's servers directly. This is a secure, standard approach.

https://auth.privy.io/apps/cmn6quyoh00vk0cjl9qmapy16

TG-005 · frontendinfo
No drainer or phishing behavior detected

Comprehensive testing of both public and authenticated pages found zero indicators of malicious wallet interaction. No setApprovalForAll calls, no hidden transaction signing, no clipboard hijacking, no data exfiltration to unknown domains. The mock wallet injection test and authenticated session test both returned clean results. 0 suspicious network requests across 459 total intercepted requests.

reports/playwright-results.json, reports/playwright-auth-results.json

This audit was performed by Opcode using AI-assisted review with human oversight. No audit can guarantee the complete absence of vulnerabilities. This report is not financial or legal advice.

© 2026 Opcode — opcode.run

OpcodeOpcode

AI-first in-house Solana security audits, publish-first reports, and trust badges with contract-change monitoring.

All systems operational

Product

  • Get Audited
  • Pricing
  • Verify Badge
  • Dashboard

Transparency

  • All Reports
  • Flag a Project
  • Press Kit

Company

  • Terms
  • Privacy

Connect

  • X / Twitter
  • Telegram

Copyright © 2026 Opcode. All rights reserved.

Public ledger·Solana mainnet