remix-cli

Fail

Audited by Snyk on Apr 17, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.85). The install.sh link is a direct shell-script download (commonly used with curl | bash) from a non-obviously-official domain which is high-risk for malware distribution, while http://localhost:3003 is only a local API endpoint and not a remote download source.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The SKILL.md explicitly instructs the agent to run CLI commands that fetch game code, assets, metadata and analytics from the Remix API (e.g., "remix games list|get", "remix games versions code get", "remix games assets list") and advises using JSON mode "for agent parsing", meaning the agent will read and act on user-generated/third-party content from remix.gg which could contain instructions that influence subsequent tool use.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The Quick Start includes the runtime command "curl -fsSL https://remix.gg/install.sh | bash", which fetches and directly executes remote shell code and is presented as the installation path for the required Remix CLI, so it constitutes an external dependency that executes remote code.

Issues (3)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 17, 2026, 08:21 PM
Issues
3