forge

Warn

Audited by Snyk on Mar 13, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's Phase 3.2 "Resource Scanning" (references/phase3.2-resource-scanning.md and phases.md) explicitly visits and reads URLs from JIRA ticket links — including Confluence pages, GitHub, and "other" links via WebFetch — and mandates reading that content to inform the implementation plan, so arbitrary/untrusted third‑party pages could inject instructions that influence subsequent planning and tool use.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.85). The skill explicitly visits arbitrary external URLs discovered in the JIRA ticket (Phase 3.2: "links.other" fetched via WebFetch) and then reads those fetched pages into the summarized_context/meta-prompter and implementation-plan generation, so those external URLs (i.e., any URL in links.other fetched at runtime via WebFetch) directly control prompts at runtime.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 13, 2026, 08:36 PM
Issues
2