gitlab-cicd-pipeline

Warn

Audited by Snyk on Mar 4, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The pipeline examples (references/complete-pipeline-configuration.md) include a security-scan job that runs "git clone https://github.com/aquasecurity/trivy.git" and then executes ./trivy, i.e., the CI workflow as documented fetches and runs code from a public third-party repository which is untrusted and could materially influence execution.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.80). The security-scan job runs at runtime and performs "git clone https://github.com/aquasecurity/trivy.git" and then attempts to execute ./trivy, which fetches remote repository content and executes code from that external URL during the pipeline.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 4, 2026, 05:09 PM