byterover-cli-memory-layer
Fail
Audited by Snyk on May 17, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.80). The package set includes a high-risk indicator: an explicit instruction to curl https://byterover.dev/install.sh and pipe it to sh (remote shell execution of an unverified script), which is dangerous; the other URLs (app.byterover.dev, ara.so, a placeholder registry.example.com, and a Git repo URL) are lower-risk in isolation but could still host malicious content if the sources are untrusted or compromised.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill explicitly fetches and ingests content from external/shared ByteRover Cloud and registries (e.g., brv vc clone , brv vc pull, brv hub install, brv hub registry add ), which can contain untrusted/user-generated context that agents will query (brv query) and use via MCP—allowing third‑party content to influence agent decisions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill's installation instructions explicitly run a remote script via "curl -fsSL https://byterover.dev/install.sh | sh", which fetches and executes remote code as a required setup step for the CLI, posing a high-risk runtime dependency.
Issues (3)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata