jta
Fail
Audited by Snyk on Feb 15, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.80). The set includes direct executable downloads from a single, likely individual GitHub account (hikanner/jta) — an unknown/unverified source — combined with explicit instructions to download and execute those binaries (a common malware vector), while the other links are legitimate API key consoles that do not mitigate the risk of running untrusted binaries.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill's installation steps explicitly run privileged operations (e.g., "sudo mv jta /usr/local/bin/") and instruct modifying system-wide locations and environment settings, which can change the machine state and require elevated privileges.
Audit Metadata