ralpher-cli
Fail
Audited by Snyk on Apr 29, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.90). The raw GitHub link is a direct install.sh (curl | sh) from an unvetted/unknown repo — a common and high‑risk vector for malware distribution; http://localhost:3000 is just a local endpoint and not a download host, but the presence of the install script makes the overall source suspicious.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). This skill instructs the agent to run ralpher-cli commands that fetch and consume live, server-provided API schemas, endpoint responses, and websocket events from arbitrary base URLs (see "ralpher-cli api", "ralpher-cli schema", and "ralpher-cli ws" in SKILL.md and references/REFERENCE.md), so untrusted third-party content can influence subsequent tool use and decisions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill instructs at runtime to install the CLI with a shell pipeline that fetches and executes remote code (curl -fsSL https://raw.githubusercontent.com/pablozaiden/ralpher/main/install.sh | sh), and the workflow relies on that CLI as a required dependency.
Issues (3)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata