chargebee-integration

Warn

Audited by Snyk on Mar 10, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). SKILL.md explicitly instructs fetching public third-party documentation (e.g., "download the README.md file from the GitHub repository" and follow links to apidocs.chargebee.com / "fetch the required topic specific markdown file"), so the agent would ingest and act on open/public web content that can influence integration actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.70). The skill instructs running remote code at runtime via "npx chargebee-init@latest --use-defaults --path=<...>" which will fetch and execute a package from the npm registry (remote code execution / supply-chain risk), and the integration guidance relies on this CLI for framework setup.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly a Chargebee billing integration. It documents SDKs, REST endpoints, API key usage, and operations for "Payment and invoice processing", "Payment method handling", subscription lifecycle, and invoice operations — all specific billing/payment actions. These are direct financial execution capabilities (charging customers, managing payments) rather than generic tooling.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 10, 2026, 01:18 AM