mox-email-server
Warn
Audited by Snyk on Mar 1, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The installation instructions download and install a remote binary via curl from https://beta.gobuilds.org/github.com/mjl-/mox@latest/linux-amd64-latest/dl and then execute it (./mox quickstart), which is a runtime fetch that executes remote code and is required for the skill.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt explicitly instructs use of sudo, systemctl, editing system and service configuration (Caddyfile, mox.conf), and firewall rules (ufw), all of which modify the host system state and require elevated privileges.
Audit Metadata