read
Audited by Socket on Apr 27, 2026
2 alerts found:
Anomalyx2SUSPICIOUS: the skill is broadly aligned with a URL-to-Markdown reader, but its core design routes arbitrary URLs through third-party proxy/reader services and processes untrusted external content in a write/exec-capable environment. The main concern is data-flow and prompt-injection risk, not confirmed malware.
No direct evidence of classic malware behavior (no backdoor/persistence/credential theft/reverse shell) is present in this Bash fragment. However, it has moderate security/supply-chain exposure: it executes an npm tool at runtime via npx --yes (which can download and run third-party code) and it forwards arbitrary user-supplied URLs to external fetching services (privacy/SSRF-like reachability depending on the behavior of those services). It also emits untrusted fetched text directly to stdout, which can be risky for downstream renderers/terminals. In high-trust environments, treat this as needing controls such as dependency pinning/verification and strict URL/proxy governance.