codex-plusplus-tweak-system

Fail

Audited by Snyk on May 2, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.90). These links include raw install scripts (curl|bash and PowerShell iex) hosted under a single, non‑well‑known GitHub account plus instructions to patch and re‑sign an app.asar — a high‑risk pattern because executing remote scripts and replacing application binaries from an unverified/unknown source can install malware or compromise the system.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content intentionally documents techniques to bypass application integrity (patching app.asar, flipping Electron integrity checks, ad‑hoc re‑signing), install persistent loaders/launch agents, and run arbitrary user-supplied ESM tweaks inside the renderer (with the app's privileges) — combined with remote installer scripts and automatic runtime/“default tweak” installation, these are explicit backdoor/supply‑chain enabling patterns that can be abused for RCE, data/credential exfiltration, and persistent compromise.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly loads and runs user-provided ESM "tweaks" from the user tweaks directory (/tweaks) (and also checks public GitHub Releases via each tweak's githubRepo), meaning arbitrary third‑party/user-generated code is executed in the renderer process as part of normal workflow and can materially change behavior.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). This skill explicitly instructs patching an installed Electron app (modifying app.asar and the Electron binary), flipping integrity checks, re-signing the app, and installing a launch agent — all operations that modify protected system/application state and bypass security/integrity mechanisms.

Issues (4)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
May 2, 2026, 12:53 AM
Issues
4