install-superpowers-for-kimi

Fail

Audited by Snyk on Apr 30, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.80). These are GitHub repositories from individual/unknown accounts that the prompt instructs you to clone and run/install (including pip install -e and custom "uv" commands) and to modify local hooks/prompts — actions that allow arbitrary code execution and local persistence, so they should be treated as suspicious.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill explicitly instructs the agent to clone and read public GitHub repositories (e.g., https://github.com/obra/superpowers.git and https://github.com/Dqz00116/kimi-cli.git), uses injected prompt files (~/.kimi/prompts/superpowers-reminder.md) that mandate reading SKILL.md files, and the agent configs allow web tools (SearchWeb/FetchURL), so the agent will fetch and interpret untrusted, user-generated third‑party content which can directly alter its tool use and decision flow.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (3)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 30, 2026, 04:41 PM
Issues
3