codex-plusplus-tweak-system
Fail
Audited by Snyk on May 2, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.90). These links include raw install scripts (curl|bash and PowerShell iex) hosted under a single, non‑well‑known GitHub account plus instructions to patch and re‑sign an app.asar — a high‑risk pattern because executing remote scripts and replacing application binaries from an unverified/unknown source can install malware or compromise the system.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content intentionally documents techniques to bypass application integrity (patching app.asar, flipping Electron integrity checks, ad‑hoc re‑signing), install persistent loaders/launch agents, and run arbitrary user-supplied ESM tweaks inside the renderer (with the app's privileges) — combined with remote installer scripts and automatic runtime/“default tweak” installation, these are explicit backdoor/supply‑chain enabling patterns that can be abused for RCE, data/credential exfiltration, and persistent compromise.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill explicitly loads and runs user-provided ESM "tweaks" from the user tweaks directory (/tweaks) (and also checks public GitHub Releases via each tweak's githubRepo), meaning arbitrary third‑party/user-generated code is executed in the renderer process as part of normal workflow and can materially change behavior.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). This skill explicitly instructs patching an installed Electron app (modifying app.asar and the Electron binary), flipping integrity checks, re-signing the app, and installing a launch agent — all operations that modify protected system/application state and bypass security/integrity mechanisms.
Issues (4)
E005
CRITICALSuspicious download URL detected in skill instructions.
E006
CRITICALMalicious code pattern detected in skill scripts.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata