go-dev
Fail
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/setup_golangci_lint.shdownloads and executes a shell script directly from a remote URL by piping it into a shell. Evidence:curl -sSfL https://raw.githubusercontent.com/golangci/golangci-lint/master/install.sh | sh -s -- -b $(go env GOPATH)/bininscripts/setup_golangci_lint.sh. - [EXTERNAL_DOWNLOADS]: Fetches the official installation script from the golangci-lint GitHub repository. Evidence: URL
https://raw.githubusercontent.com/golangci/golangci-lint/master/install.shinscripts/setup_golangci_lint.sh. - [COMMAND_EXECUTION]: The setup script executes various system-level commands with administrative privileges and modifies the project's development environment. Evidence: 1. Uses
sudoto install packages via system package managers (apt, dnf, yum, pacman) inscripts/setup_golangci_lint.sh. 2. Modifies the projectMakefileto inject linting targets. 3. Creates a.git/hooks/pre-commitfile to ensure the linter runs automatically before every code commit.
Recommendations
- AI detected serious security threats
Audit Metadata