stripe-sync-webhook
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- PROMPT_INJECTION (HIGH): The skill implements endpoints for processing untrusted external Stripe webhook data. This creates a high-risk surface for indirect prompt injection as the processed data directly influences internal database state via the stripe-sync-engine. Ingestion points: POST request bodies in Next.js, Hono, and Deno templates. Boundary markers: Stripe-signature verification is included in all provided code examples. Capability inventory: Database writes (via the sync engine) and network forwarding (fetch).
- EXTERNAL_DOWNLOADS (LOW): Recommends installing 'micro' (npm) and 'stripe-cli' (Homebrew) from standard sources.
- DATA_EXFILTRATION (LOW): The Cloudflare Workers template forwards webhook event data to a non-whitelisted URL defined by a variable (FORWARD_SYNC_URL).
- COMMAND_EXECUTION (LOW): Provides shell commands for package installation and usage of the Stripe CLI for local development and testing.
Recommendations
- AI detected serious security threats
Audit Metadata