upgrading-golang

Fail

Audited by Snyk on Mar 14, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.70). atlasgo.sh is the known installer endpoint for Ariga/Atlas (not an obviously malicious/typosquatted domain), but it delivers a remote shell installer (curl | sh) — a high-risk delivery method unless you verify TLS, inspect the script, or prefer pinned Docker images/by-digest; therefore it is potentially dangerous if used without verification.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly pulls public Docker images (docker pull golang:... and docker pull arigaio/atlas:...) and runs/queries the public installer at https://atlasgo.sh, so it ingests untrusted third-party outputs (Docker registry pull output and remote script responses) that the agent must read and use (SHA256 digests and availability/version checks) to decide and perform updates.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The skill includes runtime commands that fetch and pipe a remote installer to sh (curl -sSf https://atlasgo.sh | ATLAS_VERSION=vX.XX.X sh -s -- ...) which executes remote code and is required for the optional Atlas upgrade, so https://atlasgo.sh is a high-risk runtime dependency.

Issues (3)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 14, 2026, 11:35 PM
Issues
3