wren-sql

Fail

Audited by Snyk on Mar 20, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.90). The links point to raw GitHub content including an install.sh that the skill explicitly suggests running (curl ... | bash), and executing remote shell scripts without reviewing the repository/source is a common vector for malware and thus poses a high risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill explicitly and silently fetches the public URL https://raw.githubusercontent.com/Canner/wren-engine/main/skills/versions.json (see SKILL.md "Version check") and uses that untrusted remote content to decide whether to notify the user and present an update command (curl | bash), so third-party data can influence the agent's workflow.

Issues (2)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 20, 2026, 08:56 AM
Issues
2