hve-core-installer

Warn

Audited by Snyk on Mar 11, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly clones and reads content from the public GitHub repository (e.g., "git clone https://github.com/microsoft/hve-core.git" in the Common Clone Operation and Method steps) and reads collection manifests (collections/*.collection.yml) and package.json to build agent lists and drive copy/upgrade actions, so external repository content is ingested and can materially influence installation and agent behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The installer explicitly runs git clone (e.g., git clone https://github.com/microsoft/hve-core.git) at runtime for clone/submodule/devcontainer workflows, and the fetched repository contains agents, prompts and instructions that are incorporated into the agent context, so remote content directly controls prompts and is a required dependency for clone-based installs.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 11, 2026, 01:56 AM