gocd

Fail

Audited by Snyk on May 8, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.85). The presence of a raw GitHub install.sh (curl | sh) and a user-owned Scoop bucket/repo (jorgemuza) means these are untrusted, user-distributed installers that can pull and execute binaries—making them suspicious until you verify the repository, inspect the install script, and confirm release sources; gocd.example.com is just a placeholder.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill's workflows explicitly fetch and inspect config-repo and material content from VCS via commands like "orbit -p myprofile cd cr definitions my-repo", "cd cr status/trigger", and "cd pipeline config" (see SKILL.md and references/commands.md), which are untrusted user-generated repo/web sources that the agent is expected to read and that can materially influence subsequent actions (preflight/apply/update pipelines).

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (3)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
May 8, 2026, 04:59 PM
Issues
3