gitlab-cicd-pipeline
Warn
Audited by Snyk on Mar 4, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.70). The pipeline examples (references/complete-pipeline-configuration.md) include a security-scan job that runs "git clone https://github.com/aquasecurity/trivy.git" and then executes ./trivy, i.e., the CI workflow as documented fetches and runs code from a public third-party repository which is untrusted and could materially influence execution.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The security-scan job runs at runtime and performs "git clone https://github.com/aquasecurity/trivy.git" and then attempts to execute ./trivy, which fetches remote repository content and executes code from that external URL during the pipeline.
Audit Metadata