strava

Fail

Audited by Snyk on Mar 21, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 1.00). The URL points to a raw GitHub-hosted shell installer (install.sh) meant to be piped to sh; executing remote .sh files is high-risk because they can run arbitrary commands — even from GitHub you should inspect the script and prefer vetted package sources or release artifacts.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's context and activity commands (see src/strava_cli/commands/context.py and src/strava_cli/commands/activities.py, and documented in SKILL.md/README.md) explicitly fetch user/club activities, comments, and other Strava API data — user-generated, third‑party content — and return it as aggregated LLM context that the agent is expected to read and act on, so that arbitrary third‑party text could materially influence subsequent tool use or decisions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (3)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 21, 2026, 03:14 PM
Issues
3