adb-magisk-installer

Warn

Audited by Snyk on Mar 17, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly downloads Magisk APKs and device boot images from public GitHub releases (see "Download Magisk APK and boot image from GitHub releases" and adb-magisk-download.py) and then installs/patches/flashes those artifacts as part of its workflow, so untrusted third‑party content is ingested and can materially influence subsequent tool actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.70). The skill's adb-magisk-download.py explicitly downloads the Magisk APK and boot images at runtime from GitHub releases (via the GitHub API / https://github.com/), fetching remote executable binaries that the workflow requires and which are installed/executed on the target device.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly automates installing Magisk, patching and flashing boot images via adb/fastboot to enable rooting and Play Integrity bypass—system-level modifications and security bypasses on the target device—so it directs the agent to compromise a machine's/system image state.

Issues (3)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 17, 2026, 08:31 AM
Issues
3