civitai-analyst

Fail

Audited by Snyk on Feb 13, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The skill contains a hard-coded external MCP server endpoint and instructs use of an environment bearer token plus arbitrary SQL execution against production records (including prompts, inferred prompts, descriptions, and other PII/NSFW metadata), which creates a clear data-exfiltration and supply-chain risk even though there is no obvious obfuscated backdoor or remote code execution in the content itself.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill runs SQL queries against a civitai_records database (e.g., references/queries/content-theme-analysis.sql, tag-performance.sql, etc.) and ingests user-generated post fields such as va.description, va.inferred_prompt, va.tags and civitai.civitai_posts content—sourced from the public Civitai site (links like https://civitai.com/images/{id}) via the external MCP server configured in .mcp.json—so the agent will read untrusted third‑party/user-generated content as part of its workflow.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 13, 2026, 07:22 AM