se-dev-plugin

Warn

Audited by Snyk on Apr 28, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly downloads and indexes public plugins from the PluginHub/GitHub (see actions/search.md, SKILL.md "Plugin Code Search" and Prepare.bat which runs download_pluginhub.py and download_plugin_source.py, plus the download_plugin_source.py script itself) and instructs the agent to read and search those user-supplied open-source plugin sources as part of its workflow, so untrusted third‑party content can directly influence tool use and decisions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The Prepare.bat executed at runtime downloads and runs remote code — it invokes PowerShell to fetch-and-execute https://astral.sh/uv/install.ps1 (irm ... | iex) and also downloads the busybox executable from https://frippery.org/files/busybox/busybox64u.exe which is a required runtime tool; both are fetched during preparation and enable execution of remote code.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 28, 2026, 10:19 PM
Issues
2