antigravity-manager
Fail
Audited by Snyk on Mar 18, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.85). These URLs include direct raw installer scripts and GitHub release/download links from a single, not-widely-known user (lbjlaq) and explicitly instruct piping remote scripts into bash/PowerShell (curl | bash, irm | iex), which are high-risk remote code execution vectors even though some components (rustup.sh, GitHub) are legitimate hosts and the localhost endpoints are local service URLs.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill includes commands that fetch-and-execute remote code (e.g., curl -fsSL https://raw.githubusercontent.com/lbjlaq/Antigravity-Manager/v4.1.30/install.sh | bash and irm https://raw.githubusercontent.com/lbjlaq/Antigravity-Manager/main/install.ps1 | iex) and recommends running a remote container (lbjlaq/antigravity-manager:latest), both of which will execute externally supplied code at install/runtime and therefore pose a high-confidence execution risk.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt instructs running privileged system commands (e.g., "sudo apt install ..."), uses curl|bash installers and recommends bypassing macOS Gatekeeper (xattr -d / --no-quarantine), all of which request or enable modifications to the host system and security mechanisms.
Issues (3)
E005
CRITICALSuspicious download URL detected in skill instructions.
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata