gitlab
Fail
Audited by Snyk on Apr 6, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.90). These point to code hosted under an individual GitHub account — including a raw install.sh meant to be piped to sh and a Scoop bucket that can install binaries — which are direct executable/install sources from an unverified maintainer and therefore risky until you inspect and verify the scripts and packages.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The SKILL.md explicitly instructs the agent to fetch and read user-generated GitLab content (e.g., "orbit -p myprofile gl mr view" and "gl mr notes" in the "Review an MR end-to-end" workflow), thereby ingesting third-party MR descriptions and comments from GitLab that can influence follow-up actions like approve/merge/retry pipelines.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill's prerequisites include running a remote installer that is fetched and executed at setup time via "curl -sSfL https://raw.githubusercontent.com/jorgemuza/orbit/main/install.sh | sh", which downloads and executes remote code and is presented as a required dependency.
Issues (3)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata