setup-cairo-contracts
Fail
Audited by Snyk on Mar 5, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.80). The OpenZeppelin docs URL is a low-risk documentation link, but sh.starkup.sh is a direct shell-installer URL (curl | sh) which is high risk because executing remote scripts from non-standard or opaque domains can distribute malware.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The SKILL.md explicitly instructs fetching and executing an external script (curl -sSf https://sh.starkup.sh | sh) and to look up versions on the public docs site (https://docs.openzeppelin.com/contracts-cairo), so the workflow requires consulting and acting on untrusted third‑party web content that could alter tool actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill instructs running a runtime command that fetches and executes remote code via curl https://sh.starkup.sh | sh to install the toolchain, which directly executes external code and is required for the setup step.
Audit Metadata