fastly-cli

Warn

Audited by Snyk on Mar 18, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's required workflows include fetching and interpreting content from arbitrary public sources (e.g., "fastly compute init -f https://github.com/..." in references/compute.md, pre-flight checks like "curl -sI -H 'Host: DESIRED_HOST' https://ORIGIN_ADDRESS/" in references/services.md, and reading DNS/challenge outputs via "fastly tls-subscription describe --include tls_authorizations --json" in references/tls.md), which are untrusted third‑party pages/repos whose responses the agent is expected to read and use to decide subsequent CLI actions.

Issues (1)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 18, 2026, 04:38 PM
Issues
1