bird
Fail
Audited by Snyk on Mar 17, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.85). The direct release link is a raw executable served from an individual/unknown GitHub account (zaydiscold) with no visible signatures or checksums and an install-by-curl-and-run pattern—conditions commonly abused to distribute malware; the x.com and repository pages themselves are lower risk but do not mitigate the risk of downloading/running that binary.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill explicitly fetches and reads user-generated content from public X/Twitter URLs (x.com, twitter.com, mobile.twitter.com) via the
birdCLI as described in SKILL.md (core behavior and request orchestration), so untrusted third-party tweet content is ingested and used to drive the agent's workflow.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill's runtime installs a binary via curl from https://github.com/zaydiscold/bird/releases/download/v0.8.0/bird which downloads and installs remote executable code that the agent would run, making it a required runtime dependency.
Issues (3)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata