First Seen
Feb 18, 2026
Last Scanned
Feb 22, 2026
Findings
6
Score
100/100
Findings (6)
Detects URLs fetched at runtime that control or influence agent behavior without pinning
get --max-cost 1000 https:// + config Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.
Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.
Detects execution of shell script files via bash/sh command or direct invocation
bash
skills/lnget/scripts/install.sh Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.
Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.
Detects go install fetching and compiling arbitrary Go packages
go install github.com/lightninglabs/lnget/cmd/lnget@ Pin Go install targets to a specific version (e.g., go install example.com/tool@v1.2.3). Avoid @latest as it fetches whatever is currently published.
Likely FP if the go install target is a well-known tool (e.g., golang.org/x/ packages) pinned to a specific version in documentation.
Detects go install fetching and compiling arbitrary Go packages
go install github.com/lightninglabs/lnget/cmd/lnget@ Pin Go install targets to a specific version (e.g., go install example.com/tool@v1.2.3). Avoid @latest as it fetches whatever is currently published.
Likely FP if the go install target is a well-known tool (e.g., golang.org/x/ packages) pinned to a specific version in documentation.
Detects git clone of repositories followed by execution of cloned content
git clone https://github.com/lightninglabs/lnget.git + cd lnget
make install Review the dependency tree for nested or transitive dependencies that introduce risk. Use tools like npm audit or pip-audit to identify known vulnerabilities in the dependency chain.
Likely FP if the flagged dependency is a standard, widely-used library with no known vulnerabilities at the time of scanning.
Detects downloading binary, archive, or installer files from remote URLs
download
lnget -c -o largefile.zip https://api.example.com/largefile.zip Verify the integrity of downloaded binaries or archives using SHA-256 checksums or GPG signatures. Pin download URLs to specific versions and avoid fetching from unverified sources.
Likely FP if the download is from github.com or githubusercontent.com for a specific tagged release with documented checksums.