vx-provider-updater
Warn
Audited by Snyk on Feb 20, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill's migration templates and provider.star examples explicitly fetch and parse public GitHub release assets and other open URLs (see "Inspect Download Structure" / "Visit: https://github.com/{owner}/{repo}/releases/latest" and the Starlark examples using github_releases, github_asset_url and ctx["http"].get_json), so the agent is expected to ingest untrusted, user-controlled third‑party content that can change download/installation behavior.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The skill constructs and fetches installer assets at runtime (e.g., "https://github.com/owner/repo/releases/download/v{}/tool-v{}-{}.{}") and uses them for installs (including msiexec for .msi), which means external URLs are fetched during runtime and can result in executing remote code.
Audit Metadata