gpc-ci-integration
Fail
Audited by Snyk on Mar 12, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.90). This is a direct raw GitHub URL to an install.sh from an unverified/unknown repository and the skill explicitly suggests piping it to bash (curl | bash), a high-risk pattern that can easily distribute malware if the repo or script is malicious.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill contains a runtime command that fetches and executes remote code via curl -fsSL https://raw.githubusercontent.com/yasserstudio/gpc/main/scripts/install.sh | bash, which directly runs external code during skill execution (used to install the standalone GPC binary), so it meets the criteria for a high-risk external dependency.
Issues (2)
E005
CRITICALSuspicious download URL detected in skill instructions.
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata