gemini-use-claude-acp

Warn

Audited by Snyk on May 12, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The script spawns "pnpm dlx @zed-industries/claude-code-acp" at runtime, which downloads and executes remote adapter code from the npm registry (running the Claude Code ACP adapter that mediates prompts and can invoke tools), so this is a required runtime fetch that executes remote code.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill auto-spawns a delegated Claude ACP session with CLAUDE_CODE_SKIP_PERMISSIONS=1 and explicitly allows filesystem/shell MCP tool use (including editing files by absolute path), which enables unmediated modifications to system or privileged files and therefore risks compromising the machine state.

Issues (2)

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
MEDIUM
Analyzed
May 12, 2026, 07:07 AM
Issues
2