symbolize-android-stacktrace

Warn

Audited by Snyk on Apr 28, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly calls the Codemagic API and downloads build artefacts (scripts/codemagic_fetch_artifacts.py -> https://api.codemagic.io) and optionally reads mapping.txt and GitHub-resolved gradle files, and those untrusted third‑party/user‑generated files are parsed and used by scripts/symbolize_flutter_anr.sh to drive symbolization decisions—meeting all criteria for ingesting and acting on external content.

Issues (1)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 28, 2026, 05:28 PM
Issues
1