dev-swarm-python
Fail
Audited by Snyk on Mar 13, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.90). These are direct links to shell and PowerShell installer scripts hosted on a third‑party domain (astral.sh) — executing such remote scripts without verifying their contents/source is high risk because they can run arbitrary commands and distribute malware.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's SKILL.md tells users to fetch and execute remote install scripts from a public third-party site (e.g., "curl -LsSf https://astral.sh/uv/install.sh | sh" and the PowerShell "irm https://astral.sh/uv/install.ps1 | iex" commands), which clearly pulls and runs untrusted external content as part of the required workflow.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.95). The skill instructs executing remote install scripts at runtime (curl -LsSf https://astral.sh/uv/install.sh | sh and irm https://astral.sh/uv/install.ps1 | iex), which fetch and immediately execute remote code that the skill relies on to install uv.
Issues (3)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata