hetzner-server

Fail

Audited by Snyk on Mar 2, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.75). The Hetzner console URL is legitimate, but the raw.githubusercontent.com link points to a directly-executable install.sh (curl|bash pattern) from a personal repo — running raw scripts from user repos can execute arbitrary commands and is therefore potentially dangerous without review.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The SKILL.md explicitly includes a user-data example that curls and pipes a public GitHub raw URL (https://raw.githubusercontent.com/connorads/dotfiles/master/install.sh) into bash, which fetches and executes untrusted third-party code as part of the provisioning workflow and can materially change behavior or outputs the agent may read when monitoring setup.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 2, 2026, 07:39 PM