pueue-job-orchestration

Fail

Audited by Snyk on Mar 10, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The content contains intentional telemetry and callback mechanisms that can exfiltrate commands, stdout/stderr, environment snapshots to external endpoints (e.g., curl to hooks.example.com), plus a "pretooluse" hook that silently rewrites user commands to run through pueue (covert instrumentation), and it endorses piping remote install scripts to bash and storing secrets in .env — all deliberate patterns that can be used as backdoors or for credential/data exfiltration.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill's installation instructions in references/installation-guide.md explicitly tell the user/agent to curl and execute public GitHub-hosted scripts (e.g., "curl -sSL https://raw.githubusercontent.com/terrylica/rangebar-py/main/scripts/setup-pueue-linux.sh | bash" and downloading releases from github.com), which clearly fetches and runs untrusted, user-hosted third-party content that can materially alter tool behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 10, 2026, 08:16 AM