desktop-sandbox

Fail

Audited by Snyk on Mar 1, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.90). This is a GitHub repository from an unfamiliar/unnverified account that (per the skill) distributes platform installers (.exe/.pkg) via releases—direct executables from an unknown source are a high-risk indicator for malware distribution.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's installer script (scripts/run_installer.js) directly calls fetchGitHubRelease to query the public GitHub API and then downloads the release asset via asset.browser_download_url (downloadFile) and executes it (runInstaller), which pulls and runs untrusted/public third-party content that can materially change behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The skill instructs installing system-level software into privileged locations (e.g., C:\Program Files\ and /), which would modify system files and likely require elevated privileges, so it pushes the agent to change the machine state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 1, 2026, 01:51 PM