install-opend
Warn
Audited by Snyk on Apr 5, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill explicitly fetches and parses redirect headers and file names from public third-party endpoints (e.g., https://www.futunn.com/download/fetch-lasted-link?... and https://www.moomoo.com/... and softwaredownload.futunn.com / softwaredownload.moomoo.com) to extract LATEST_VER and construct download URLs, and that parsed content directly controls download, version checks, and installation actions in the required SKILL.md workflow.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill explicitly performs runtime downloads and executes installers from external URLs (e.g., https://www.futunn.com/download/fetch-lasted-link?name=opend-windows and the derived direct download URLs on https://softwaredownload.futunn.com/ and https://softwaredownload.moomoo.com/), so fetched remote binaries are required by the flow and will be executed—constituting a high-risk runtime external dependency.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.90). The prompt directs the agent to download and execute installers, run privileged package-manager commands (sudo dpkg/apt, rpm), copy into system directories (e.g. /Applications) and execute scripts — all actions that modify system state and require elevated privileges.
Issues (3)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata