officecli-data-dashboard
Fail
Audited by Snyk on Apr 13, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.90). The URLs point to raw installer scripts and a GitHub releases endpoint for an unfamiliar account and the skill explicitly tells users to curl/irm and pipe those scripts to a shell/PowerShell — a high-risk pattern because executing remote scripts from an untrusted repository is a common malware distribution vector.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The SKILL.md "BEFORE YOU START (CRITICAL)" section explicitly instructs fetching and executing external content (curl calls to raw.githubusercontent.com and queries to api.github.com to download/upgrade the officecli installer), so the agent will ingest and act on untrusted public third‑party content from GitHub which can materially change runtime behavior.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill explicitly instructs running remote install scripts at runtime (curl -fsSL https://raw.githubusercontent.com/iOfficeAI/OfficeCli/main/install.sh | bash and the PowerShell equivalent https://raw.githubusercontent.com/iOfficeAI/OfficeCli/main/install.ps1 | iex), which downloads and executes remote code and is required for the officecli dependency.
Issues (3)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata