cm

Fail

Audited by Snyk on Apr 6, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.90). Although the URLs are hosted on GitHub (a reputable platform), they point to an unknown/personal account and include a direct raw .sh install script (curl | bash) and repo clones from an unverified source—classic high-risk indicators because running unreviewed install scripts can install arbitrary/malicious binaries.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill's primary workflow (e.g., "cm context" which returns historySnippets from the CASS episodic memory and "cm onboard read /path/session.jsonl --template" which returns sessionContent) explicitly ingests and uses raw cross-agent session logs (user-generated, potentially remote/untrusted) as part of decision-making and rule creation, so third‑party content can materially influence tool actions and behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (3)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 6, 2026, 07:13 AM
Issues
3