hve-core-installer
Warn
Audited by Snyk on Mar 11, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill explicitly clones and reads content from the public GitHub repository (e.g., "git clone https://github.com/microsoft/hve-core.git" in the Common Clone Operation and Method steps) and reads collection manifests (collections/*.collection.yml) and package.json to build agent lists and drive copy/upgrade actions, so external repository content is ingested and can materially influence installation and agent behavior.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The installer explicitly runs git clone (e.g., git clone https://github.com/microsoft/hve-core.git) at runtime for clone/submodule/devcontainer workflows, and the fetched repository contains agents, prompts and instructions that are incorporated into the agent context, so remote content directly controls prompts and is a required dependency for clone-based installs.
Audit Metadata