Skip to main content
Scans/github/ghostwright/phantom

ghostwright/phantom

github

Share

Summary

ghostwright/phantom v2026-03-29 was classified as CRITICAL RISK with a risk score of 1170. Sigil detected 116 findings across 241 files, covering phases including provenance, network exfiltration, install hooks. Review the findings below before installing this package.

Package description: An AI co-worker with its own computer. Self-evolving, persistent memory, MCP server, secure credential collection, email identity. Built on the Claude Agent SDK.

CRITICAL RISK(1170)

v2026-03-29

29 March 2026, 23:02 UTC

by Sigil Bot

Risk Score

1170

Findings

116

Files Scanned

241

Provenance

Findings by Phase

Phase Ordering

Phases are ordered by criticality, with the most dangerous at the top. Click any phase header to expand or collapse its findings. Critical phases are expanded by default.

install-makefile-curl

HIGH

Makefile/script pipes remote content to shell

repo/docs/getting-started.md:197

# Install Docker (official method for Ubuntu/Debian)
curl -fsSL https://get.docker.com | sh
```
Why was this flagged?

A script or Makefile pipes content from a remote URL directly into a shell (curl | sh or wget | bash). This is inherently dangerous because the remote content can change at any time, and the command runs with the current user's permissions. Rated HIGH because it requires manual execution (unlike install hooks) but still executes arbitrary remote code.

install-makefile-curl

HIGH

Makefile/script pipes remote content to shell

repo/scripts/install.sh:7

# Usage:
#   curl -sSL https://raw.githubusercontent.com/ghostwright/phantom/main/scripts/install.sh | bash
#   bash install.sh --yes
Why was this flagged?

A script or Makefile pipes content from a remote URL directly into a shell (curl | sh or wget | bash). This is inherently dangerous because the remote content can change at any time, and the command runs with the current user's permissions. Rated HIGH because it requires manual execution (unlike install hooks) but still executes arbitrary remote code.

install-makefile-curl

HIGH

Makefile/script pipes remote content to shell

repo/scripts/install.sh:102

  info "Installing Docker..."
  curl -fsSL https://get.docker.com | bash > /dev/null 2>&1
  systemctl enable docker
Why was this flagged?

A script or Makefile pipes content from a remote URL directly into a shell (curl | sh or wget | bash). This is inherently dangerous because the remote content can change at any time, and the command runs with the current user's permissions. Rated HIGH because it requires manual execution (unlike install hooks) but still executes arbitrary remote code.

install-makefile-curl

HIGH

Makefile/script pipes remote content to shell

repo/scripts/install.sh:125

  info "Installing Bun..."
  curl -fsSL https://bun.sh/install | bash > /dev/null 2>&1
  # Bun installs to ~/.bun/bin/bun. Copy to /usr/local/bin for system-wide access.
Why was this flagged?

A script or Makefile pipes content from a remote URL directly into a shell (curl | sh or wget | bash). This is inherently dangerous because the remote content can change at any time, and the command runs with the current user's permissions. Rated HIGH because it requires manual execution (unlike install hooks) but still executes arbitrary remote code.

install-makefile-curl

HIGH

Makefile/script pipes remote content to shell

repo/scripts/install.sh:135

  warn "Bun binary appears broken. Reinstalling..."
  curl -fsSL https://bun.sh/install | bash > /dev/null 2>&1
  if [ -f /root/.bun/bin/bun ]; then
Why was this flagged?

A script or Makefile pipes content from a remote URL directly into a shell (curl | sh or wget | bash). This is inherently dangerous because the remote content can change at any time, and the command runs with the current user's permissions. Rated HIGH because it requires manual execution (unlike install hooks) but still executes arbitrary remote code.

install-makefile-curl

HIGH

Makefile/script pipes remote content to shell

repo/src/cli/doctor.ts:20

				message: `Bun ${version} (recommend 1.x+)`,
				fix: "curl -fsSL https://bun.sh/install | bash",
			};
Why was this flagged?

A script or Makefile pipes content from a remote URL directly into a shell (curl | sh or wget | bash). This is inherently dangerous because the remote content can change at any time, and the command runs with the current user's permissions. Rated HIGH because it requires manual execution (unlike install hooks) but still executes arbitrary remote code.

install-makefile-curl

HIGH

Makefile/script pipes remote content to shell

repo/src/cli/doctor.ts:25

	} catch {
		return { name: "Bun", status: "fail", message: "Not found", fix: "curl -fsSL https://bun.sh/install | bash" };
	}
Why was this flagged?

A script or Makefile pipes content from a remote URL directly into a shell (curl | sh or wget | bash). This is inherently dangerous because the remote content can change at any time, and the command runs with the current user's permissions. Rated HIGH because it requires manual execution (unlike install hooks) but still executes arbitrary remote code.

Badge

Sigil scan badge for github/ghostwright/phantom

Markdown

[![Sigil Scan](https://sigilsec.ai/badge/github/ghostwright/phantom)](https://sigilsec.ai/scans/276BEE36-5D3F-47FD-A99A-510F07B534DE)

HTML

<a href="https://sigilsec.ai/scans/276BEE36-5D3F-47FD-A99A-510F07B534DE"><img src="https://sigilsec.ai/badge/github/ghostwright/phantom" alt="Sigil Scan"></a>

Run This Scan Yourself

Scan your own packages

Run Sigil locally to audit any package before it touches your codebase.

curl -sSL https://sigilsec.ai/install.sh | sh
Read the docs →Free. Apache 2.0.

Early Access

Get cloud scanning, threat intel, and CI/CD integration.

Join 150+ developers on the waitlist.

Get threat intelligence and product updates

Security research, new threat signatures, and product updates. No spam.

Other github scans

Believe this result is incorrect? Request a review or see our Terms of Service and Methodology.

Scanned bySigil Bot