generating-memes
Fail
Audited by Snyk on Feb 15, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.70). These URLs point to a GitHub repository and a direct download of a prebuilt Linux executable from its Releases page — while GitHub is a common distribution channel, fetching and running an unsigned binary from an unverified/unknown project/maintainer (instead of an official package manager or signed release) poses a meaningful malware risk unless the repo, release artifacts, checksums, and maintainer reputation are independently verified.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.70). The skill instructs use of "meme download" and explicit curl/download commands that fetch template assets and the CLI binary from public GitHub releases and cdn.jsdelivr.net (https://github.com/MemeCrafters/meme-generator-rs and cdn.jsdelivr.net), so the agent would ingest untrusted third‑party template/assets as part of previews/generation.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (medium risk: 0.60). The prompt includes explicit installation instructions that use sudo to move a binary into /usr/local/bin (and thereby modify system-wide files), which asks the agent/user to perform privileged operations affecting machine state.
Audit Metadata