update-config

Fail

Audited by Snyk on Apr 28, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.90). These are raw GitHub URLs that instruct running a remote shell script from an apparently personal/unknown repository — executing such a script directly is high risk because it can run arbitrary code on your machine and there is no visible vetting or popularity signal for safety.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill fetches and then executes untrusted code from raw.githubusercontent.com (the remote VERSION and the install.sh URL in Step 1/Step 2 of SKILL.md), so third‑party content from that public GitHub repo can directly control installer behavior and executed actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (medium risk: 0.60). The skill instructs the agent to non-interactively download and execute a remote installer (bash <(curl ...)) that modifies user configuration, installs fonts/dependencies and rewrites files under the user's home, so it changes the machine state and could be harmful even though it does not explicitly request sudo or create system-level accounts.

Issues (4)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 28, 2026, 06:03 AM
Issues
4