Poetry Packaging
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The skill contains a piped remote execution pattern for tool installation. * Evidence: Found
curl -sSL https://install.python-poetry.org | python3 -inSKILL.md. * Severity: Initially CRITICAL due to the 'curl | shell' pattern, the severity is reduced to HIGH because the activity is essential to the primary purpose of the skill (Poetry packaging). - [EXTERNAL_DOWNLOADS] (HIGH): Remote script execution is performed from a non-whitelisted domain. * Evidence: Source URL
https://install.python-poetry.orgis not in the trusted source list.
Recommendations
- HIGH: Downloads and executes remote code from: https://install.python-poetry.org - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata