opencron

Warn

Audited by Snyk on Mar 6, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's install-system.js and install scripts explicitly fetch and execute public third‑party resources (e.g., execSync('curl -fsSL https://deb.nodesource.com/setup_20.x | sudo -E bash ...') and running 'curl ...raw.githubusercontent.com/.../install.sh' and 'npm install -g opencron-system'), so the agent runs and acts on external, untrusted web content (npm/HTTP scripts) as part of its workflow.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.70). Flagged because the skill explicitly tells the agent/user to perform system-level installations and even suggests using sudo/administrator privileges (e.g., "sudo npm install -g") and to start/restart system/global services (PM2), which pushes the agent to obtain elevated privileges and modify the machine state.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 6, 2026, 01:38 PM