phonebase

Warn

Audited by Snyk on Apr 16, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The SKILL.md explicitly exposes the agent to arbitrary web content via "pb browse " (Browser & Navigation) and instructs using "pb dumpc" to read UI text and "pb tap"/other actions to interact, so untrusted third‑party webpages shown on the cloud phone can be read and acted on and thus could supply indirect instructions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The skill explicitly instructs the user to run the installer at runtime via "curl -fsSL https://get.phonebase.cloud | sh", which fetches and immediately executes remote code (and is presented as the required installer for the pb CLI), so this URL is a high-confidence runtime dependency that executes remote code.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 16, 2026, 03:00 PM
Issues
2