tmux-remote-worker-setup

Fail

Audited by Snyk on Apr 13, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 1.00). This is high risk: it's an unencrypted HTTP endpoint on an unfamiliar/likely internal domain that the skill explicitly evals (eval $(curl ...)), so it can deliver arbitrary shell instructions or proxy settings and therefore could be used to distribute malware or capture credentials.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The skill contains high-risk patterns: it evals remote-fetched shell output (eval $(curl ...)), automatically copies local config/.env files (potentially leaking credentials) to remote machines, injects /etc/hosts entries and persistent notify hooks, and uses proxy bootstraping that can route commands through an external host — together these behaviors enable remote code execution, credential exposure, traffic redirection, and potential covert exfiltration/persistence despite there being no obfuscated payloads.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (3)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 13, 2026, 08:37 AM
Issues
3