macos-brew

Warn

Audited by Snyk on Mar 7, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). This skill's Integration Notes explicitly instruct fetching and running a public install script from raw.githubusercontent.com ("/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)\"") and documents adding arbitrary external taps (e.g., brew tap <user/repo>) which cause the agent to fetch and execute/interpret untrusted third-party repository content that can change subsequent tool behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill explicitly recommends running a runtime fetch-and-execute command that downloads and runs remote code from https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh (via /bin/bash -c "$(curl -fsSL ... )"), which directly executes remote code as part of setup.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The skill explicitly instructs modifying system state (installing packages and services, editing PATH and shell config), recommends bypassing macOS security (--no-quarantine, curl|bash) and suggests running sudo (e.g., chown /opt/homebrew), which encourages privilege escalation and altering system files.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 7, 2026, 05:47 PM