jta

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.80). The set includes direct executable downloads from a single, likely individual GitHub account (hikanner/jta) — an unknown/unverified source — combined with explicit instructions to download and execute those binaries (a common malware vector), while the other links are legitimate API key consoles that do not mitigate the risk of running untrusted binaries.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill's installation steps explicitly run privileged operations (e.g., "sudo mv jta /usr/local/bin/") and instruct modifying system-wide locations and environment settings, which can change the machine state and require elevated privileges.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 15, 2026, 09:52 PM