setup-cairo-contracts

Fail

Audited by Snyk on Mar 5, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.80). The OpenZeppelin docs URL is a low-risk documentation link, but sh.starkup.sh is a direct shell-installer URL (curl | sh) which is high risk because executing remote scripts from non-standard or opaque domains can distribute malware.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The SKILL.md explicitly instructs fetching and executing an external script (curl -sSf https://sh.starkup.sh | sh) and to look up versions on the public docs site (https://docs.openzeppelin.com/contracts-cairo), so the workflow requires consulting and acting on untrusted third‑party web content that could alter tool actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The skill instructs running a runtime command that fetches and executes remote code via curl https://sh.starkup.sh | sh to install the toolchain, which directly executes external code and is required for the setup step.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 5, 2026, 06:41 PM