desktop-framework-tauri
Warn
Audited by Snyk on Apr 7, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.70). The skill's documentation and examples explicitly show using the HTTP plugin and auto-updater endpoints (examples/plugins.md and examples/packaging.md) where the Rust backend fetches JSON from public URLs (e.g., https://api.example.com/data and updater endpoints) and then parses that content to drive actions like downloadAndInstall/relaunch, which means untrusted third‑party responses can materially influence runtime behavior.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The skill config includes an auto-updater endpoint (e.g. "https://releases.example.com/{{target}}/{{arch}}/{{current_version}}") which is contacted at runtime by the updater plugin to fetch update metadata and binaries that can be downloaded and installed (i.e., execute remote code), so this is a runtime external dependency that can control executable content.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata