desktop-framework-tauri

Warn

Audited by Snyk on Apr 7, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill's documentation and examples explicitly show using the HTTP plugin and auto-updater endpoints (examples/plugins.md and examples/packaging.md) where the Rust backend fetches JSON from public URLs (e.g., https://api.example.com/data and updater endpoints) and then parses that content to drive actions like downloadAndInstall/relaunch, which means untrusted third‑party responses can materially influence runtime behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.80). The skill config includes an auto-updater endpoint (e.g. "https://releases.example.com/{{target}}/{{arch}}/{{current_version}}") which is contacted at runtime by the updater plugin to fetch update metadata and binaries that can be downloaded and installed (i.e., execute remote code), so this is a runtime external dependency that can control executable content.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 7, 2026, 01:33 AM
Issues
2