codexmcp-claude-codex-collaboration

Fail

Audited by Snyk on May 17, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.85). Mixed sources: although some links point to official documentation (OpenAI, Anthropic/Claude, MCP), the skill explicitly instructs piping remote installer scripts into shell/PowerShell (astral.sh install.sh and install.ps1) and pulling a GitHub package from an unknown/low-profile GuDaStudio repo—running remote scripts and installing from unvetted repositories is a common malware distribution pattern and therefore high risk.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill includes explicit instructions that bypass security (e.g., PowerShell -ExecutionPolicy ByPass, curl | sh installation), and exposes options to skip approvals and request "danger-full-access"/"yolo", which encourage bypassing protections and granting full workspace access.

Issues (3)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
May 17, 2026, 08:21 AM
Issues
3