minecraft-modpack-server
Warn
Audited by Snyk on Apr 27, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). The skill requires downloading and inspecting an arbitrary server pack ZIP from a third-party URL (see "Step 1. Download & Inspect the Pack" with wget -O serverpack.zip ""), which is untrusted/user-generated content (CurseForge/Modrinth packs) that the agent must read to determine mod loader, Java version, and launch behavior, so those third-party instructions could materially change actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill explicitly runs wget -O serverpack.zip "" at runtime and then unzips and may execute included scripts/jars (e.g., startserver.sh or forge-*-installer.jar), so the remote "" can deliver code that will be executed on the host.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt instructs running privileged commands (e.g., sudo apt install, sudo ufw allow) that modify system packages and firewall rules, which are elevated/host-level state changes.
Issues (3)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata