day2-create-context-sync-skill

Warn

Audited by Snyk on Mar 5, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's required workflow (SKILL.md and templates/context-sync.md) explicitly directs Claude to fetch and ingest third‑party, user‑generated content (Slack, Gmail, Notion, public RSS/web pages) via MCP/subagent calls and to act on those results (e.g., produce highlights, action items, send Slack/Notion updates), and the included script scripts/mcp_servers.py even downloads a public GitHub README (README_URL) to discover MCP servers — meaning untrusted external content is read, interpreted, and can materially influence subsequent tool use and decisions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.80). The skill's scripts/mcp_servers.py downloads and parses the external README at runtime from https://raw.githubusercontent.com/modelcontextprotocol/servers/main/README.md and uses the fetched entries to generate installation commands and .mcp.json configuration (which directly control the agent's presented prompts/instructions and can lead to executing remote packages like via npx), so the external content meaningfully controls runtime behavior.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 5, 2026, 08:30 AM