uv-troubleshooting

Fail

Audited by Snyk on Feb 24, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.70). While pypi.org and the documented docs.astral.sh pages are legitimate, the presence of a direct shell installer (https://astral.sh/uv/install.sh — which is an executable script you’re instructed to run) plus unknown custom package index domains (https://custom.index.com and its /simple endpoint) represent supply‑chain and executable download risks and should be treated as potentially malicious unless independently verified.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). This skill's SKILL.md explicitly instructs querying and consuming public package index/web content (e.g., "Search PyPI website" and commands like "pip index versions", "pip search", and "Check your PyPI sources" in Step 2 / Source conflicts) and to use custom/extra-index-urls, meaning untrusted public package metadata and pages would be read and used to drive dependency-resolution and tool actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill includes and recommends running a remote install script at runtime (curl -LsSf https://astral.sh/uv/install.sh | sh), which fetches and executes remote code and is listed as a required installation method.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 24, 2026, 05:27 PM