payram-setup
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [Remote Code Execution] (CRITICAL): The skill executes a remote script using the
curl | bashpattern. This allows an external party to execute arbitrary commands on the system with no validation of the script's content. - Evidence:
curl -fsSL https://raw.githubusercontent.com/PayRam/payram-server/main/install.sh | bashfound in automated scan results. - [External Downloads] (HIGH): The download source
https://raw.githubusercontent.com/PayRam/payram-server/main/install.shbelongs to an untrusted GitHub organization (PayRam). Execution of unverified scripts from non-standard or untrusted sources is a major security violation. - [Command Execution] (HIGH): The use of shell piping to execute downloaded content bypasses standard package management and security reviews, facilitating potential system compromise.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/PayRam/payram-server/main/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata