apideck-node

Warn

Audited by Snyk on Feb 28, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's SKILL.md and reference files explicitly show the SDK fetching and ingesting user-generated third-party content (e.g., apideck.fileStorage.files.download and files.list in references/file-storage-api.md, Vault JS session/modal in references/vault-js.md, and webhook payload handling in references/webhook-api.md) from connectors like Google Drive, ATS systems, social links and others — content the agent is expected to read/handle and that could materially alter behavior, enabling indirect prompt injection.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill includes a client-side CDN import that is fetched and executed at runtime — https://unpkg.com/@apideck/vault-js — and the examples rely on that remote JS to open the Vault modal, so it executes remote code as a runtime dependency.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly designed for accounting and e-commerce integrations and exposes accounting resources such as invoices, bills, and notably "payments" (apideck.accounting.* with CRUD operations). It documents creating/updating/deleting records, payment-related endpoints, and pass-through parameters for connector-specific operations (e.g., serviceId "quickbooks"/"xero") and Vault connection management for OAuth to downstream financial services. These are specific, finance-focused APIs (not generic browser or HTTP tooling) capable of initiating or managing payment-related operations via downstream connectors, so this qualifies as direct financial execution capability.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 28, 2026, 08:40 PM