The install script calls download_release_from_repo then install_from_file, but it extracts the release without verifying integrity or authenticity. An attacker who can replace a release artifact (or a compromised intermediary/CA) could supply a malicious archive and it would be installed silently.
Please consider adding GPG-signed release artifacts / signatures (or a signed checksum manifest). Just using HTTPS isn't an adequate root of trust against repo compromise, compromised signing accounts, CA compromises, or targeted attacks.