upgrading-golang
Fail
Audited by Snyk on Mar 14, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.70). atlasgo.sh is the known installer endpoint for Ariga/Atlas (not an obviously malicious/typosquatted domain), but it delivers a remote shell installer (curl | sh) — a high-risk delivery method unless you verify TLS, inspect the script, or prefer pinned Docker images/by-digest; therefore it is potentially dangerous if used without verification.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill explicitly pulls public Docker images (docker pull golang:... and docker pull arigaio/atlas:...) and runs/queries the public installer at https://atlasgo.sh, so it ingests untrusted third-party outputs (Docker registry pull output and remote script responses) that the agent must read and use (SHA256 digests and availability/version checks) to decide and perform updates.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill includes runtime commands that fetch and pipe a remote installer to sh (curl -sSf https://atlasgo.sh | ATLAS_VERSION=vX.XX.X sh -s -- ...) which executes remote code and is required for the optional Atlas upgrade, so https://atlasgo.sh is a high-risk runtime dependency.
Issues (3)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata