NYC

celery

Warn

Audited by Snyk on Feb 15, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). This skill includes example tasks that fetch and ingest arbitrary public URLs and external payloads (e.g., fetch_url and fetch_and_process that call requests.get(url), fetch_data/download(source), and webhook handlers that accept external webhook_data), so it clearly exposes the agent to untrusted, user-provided third-party content.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill includes explicit /etc/systemd/system service unit files and production service/daemon setup (PIDfiles, /var/log, User=celery) which directly instruct creating/modifying privileged system service files and altering system state requiring root privileges.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 15, 2026, 08:34 PM