xurl

Fail

Audited by Snyk on Mar 12, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.70). Domains (github.com, raw.githubusercontent.com, x.com, api.x.com) are legitimate, but the presence of a raw.githubusercontent.com install.sh intended to be curl‑| bash from an otherwise not‑widely‑known GitHub repo makes this a potentially risky download vector — executing remote shell scripts and installing packages from an unknown account can distribute malware.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). This skill explicitly fetches and reads public, user-generated X content (e.g., SKILL.md commands like "xurl read", "xurl search", "xurl timeline", "xurl dms" and the "Search and engage" / "Reply to a conversation" workflows), and those third‑party posts can be interpreted by the agent and drive follow-up actions (likes, replies, reposts), enabling indirect prompt injection.

Issues (2)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 12, 2026, 01:54 AM
Issues
2