se-dev-plugin
Warn
Audited by Snyk on Apr 28, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill explicitly downloads and indexes public plugins from the PluginHub/GitHub (see actions/search.md, SKILL.md "Plugin Code Search" and Prepare.bat which runs download_pluginhub.py and download_plugin_source.py, plus the download_plugin_source.py script itself) and instructs the agent to read and search those user-supplied open-source plugin sources as part of its workflow, so untrusted third‑party content can directly influence tool use and decisions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The Prepare.bat executed at runtime downloads and runs remote code — it invokes PowerShell to fetch-and-execute https://astral.sh/uv/install.ps1 (irm ... | iex) and also downloads the busybox executable from https://frippery.org/files/busybox/busybox64u.exe which is a required runtime tool; both are fetched during preparation and enable execution of remote code.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata