apify-actorization

Warn

Audited by Snyk on May 14, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's examples and required workflow (e.g., js-ts-actorization and python-actorization examples, Step 8 "apify run --input '{"startUrl":"https://example.com"...}'" and Crawlee PlaywrightCrawler code) explicitly instruct actors to fetch and process arbitrary external web pages (startUrl), which are untrusted third-party sources that the agent would read and could influence runtime behavior.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill includes an explicit monetization API call ("Charge for events in your code with await Actor.charge('result')") and instructions for configuring Pay-Per-Event monetization. That is a specific function to send charges/transactions (direct financial execution), not a generic capability like browser automation or general HTTP calls.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
MEDIUM
Analyzed
May 14, 2026, 08:50 AM
Issues
2