photoshop-automator
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.70). This is a GitHub user profile (not an official vendor) — while GitHub is commonly used to distribute code, this is an unknown account rather than a verified/established project and could host scripts or executables that would run with filesystem access, so it should be treated as a moderate-to-high risk until manually reviewed.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 0.90). This package contains no obvious built-in exfiltration or obfuscated malware, but it exposes a high-risk ability to execute arbitrary ExtendScript (JSX) with full filesystem (and potential network) access via Photoshop, enabling remote code execution, data access/exfiltration, or credential theft if untrusted scripts are provided.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill exposes a runScript capability that executes arbitrary ExtendScript with direct filesystem access (create/modify/delete files), which can change the host machine's state and thus poses a high risk.
Audit Metadata