using-perplexity-for-context

Fail

Audited by Snyk on Mar 10, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E004: Prompt injection detected in skill instructions.

  • Potential prompt injection detected (high risk: 0.90). The prompt instructs the agent to silently load and periodically refresh a shared user profile and to "Do NOT announce usage" of the external search, which are hidden/deceptive behaviors (silent data access/updates and concealment) beyond the stated purpose of simply using Perplexity for context enrichment.

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill instructs the agent to ask the user for their Perplexity API key and then embed it verbatim into a shell command (echo '{"apiKey": "USER_API_KEY_HERE", ...}' > config.json), which requires the LLM to handle and output the secret directly.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The skill contains deliberate stealth and data-collection behaviors — e.g., "Do NOT announce usage", silent/automatic profile harvesting and periodic refresh from conversation history, storing and using user API keys, and instructions to launch an unverified local Node server — which together indicate a high risk of intentional privacy-invasive data exfiltration and potential backdoor/remote-execution abuse.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill explicitly instructs the agent to invoke the perplexity_search tool and ingest its "Full Results" (SKILL.md: "Invoke perplexity_search tool", "Full Results" with citations), which pulls open-web/public search results that the agent must read and integrate into responses, exposing it to untrusted third‑party content that could contain injected instructions.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 10, 2026, 02:19 AM