uv
Audited by Socket on Mar 11, 2026
2 alerts found:
SecurityAnomalyThe skill is coherently aimed at guiding UV usage for Python project management and MCP server workflows, but its install instructions rely on remote installer scripts executed via curl|sh and PowerShell iex. These download-execute patterns present significant supply-chain and remote-code execution risk, especially since the installers are not verifiably signed or tied to official registries in the documentation. Given the combination of a legitimate development tooling purpose and risky installation vectors, the overall stance should be SATISFACTORILY considered suspicious-to-benign; however, due to the direct download-execute patterns and unverifiable dependencies, the footprint is not fully aligned with safe, verifiable install practices. Treat as SUSPICIOUS with a strong emphasis on credential/resource provenance checks before use in any environment.
The CI/CD fragments show standard tooling and workflow practices but hinge critically on a remote installer fetched at runtime without integrity checks. This creates a significant supply-chain and remote-code-execution risk, especially for deployment steps that publish artifacts. Recommended mitigations include enforcing installer integrity verification, pinning versions, using trusted installers or self-hosted mirrors, and minimizing external script execution in CI.