implementing-tls

Warn

Audited by Snyk on Feb 15, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill includes scripts and commands that connect to arbitrary external hosts and ingest their TLS data (for example scripts/test-tls.sh, scripts/check-tls-expiry.sh, and scripts/check-cert-expiry.sh call "openssl s_client -connect $DOMAIN" and parse certificate fields, and certbot/cert-manager examples interact with Let's Encrypt ACME endpoints), so the agent would read and interpret untrusted, third‑party content from public servers.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The skill contains multiple explicit privileged operations (sudo apt/certbot, writing/reading /etc/letsencrypt and /etc/ssl, adding CAs to the system trust store, installing system-level services and Kubernetes cert-manager) that instruct changing system-wide files and require elevated privileges, so it pushes the agent to perform state-changing, privileged actions.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 15, 2026, 10:40 PM