mcp-us-equities-intraday
Fail
Audited by Snyk on Mar 9, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.99). Yes — the raw GitHub URL points to an executable .sh from an untrusted/unknown account (and the prompt encourages curl | bash), and the second is an unencrypted HTTP IP:port backend — together these are classic vectors for remote code execution/malware distribution.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 0.90). The skill contains high-risk supply-chain and exfiltration indicators — it instructs users to curl|bash an external installer from an untrusted GitHub user and to point the tool to a raw HTTP IP address (113.44.56.214:18080), which could install a backdoor, enable remote command/control, or exfiltrate sensitive data; no explicit benign justification is present in the content.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill's preflight and installation explicitly run a remote install script via curl piped to bash (https://raw.githubusercontent.com/zz3310969/max-skills/main/scripts/install-rw.sh), which fetches and executes remote code at runtime and is required for the skill to operate.
Audit Metadata