stripe-sync-webhook

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHPROMPT_INJECTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
  • PROMPT_INJECTION (HIGH): The skill implements endpoints for processing untrusted external Stripe webhook data. This creates a high-risk surface for indirect prompt injection as the processed data directly influences internal database state via the stripe-sync-engine. Ingestion points: POST request bodies in Next.js, Hono, and Deno templates. Boundary markers: Stripe-signature verification is included in all provided code examples. Capability inventory: Database writes (via the sync engine) and network forwarding (fetch).
  • EXTERNAL_DOWNLOADS (LOW): Recommends installing 'micro' (npm) and 'stripe-cli' (Homebrew) from standard sources.
  • DATA_EXFILTRATION (LOW): The Cloudflare Workers template forwards webhook event data to a non-whitelisted URL defined by a variable (FORWARD_SYNC_URL).
  • COMMAND_EXECUTION (LOW): Provides shell commands for package installation and usage of the Stripe CLI for local development and testing.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 12:33 AM