apify-actorization
Warn
Audited by Snyk on May 14, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's examples and required workflow (e.g., js-ts-actorization and python-actorization examples, Step 8 "apify run --input '{"startUrl":"https://example.com"...}'" and Crawlee PlaywrightCrawler code) explicitly instruct actors to fetch and process arbitrary external web pages (startUrl), which are untrusted third-party sources that the agent would read and could influence runtime behavior.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill includes an explicit monetization API call ("Charge for events in your code with await Actor.charge('result')") and instructions for configuring Pay-Per-Event monetization. That is a specific function to send charges/transactions (direct financial execution), not a generic capability like browser automation or general HTTP calls.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata