hiclaw-test

Warn

Audited by Snyk on Apr 6, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). This skill explicitly clones the public GitHub repo and—more importantly—runs scripts (scripts/hiclaw-debug.sh and its embedded Python) that ingest and parse debug output including a matrix-messages directory containing user-generated Matrix chat JSONL files (produced by export-debug-log.py) and uses message bodies to drive hang analysis and recommendations, so untrusted third-party/user content is read and can influence decisions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The run-hiclaw-test.sh and SKILL.md explicitly perform a runtime git clone of https://github.com/alibaba/hiclaw.git and then run its Makefile, test scripts (e.g., make test, ./tests/run-all-tests.sh) and Python scripts, meaning fetched repository content is executed and controls the agent's runtime behavior.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 6, 2026, 08:12 AM
Issues
2