debugging-workflows

Warn

Audited by Snyk on Apr 10, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly uses the GitHub CLI to fetch and parse workflow runs, job logs, artifacts, and agentic-workflow markdown (e.g., "gh run list/view/download", "gh aw audit", and the download-workflow-logs.ts / download-workflow-summary.ts scripts), which pulls user-generated content from arbitrary GitHub repos and logs that the agent is expected to read and use to diagnose and take follow-up actions—exposing it to untrusted third-party content that could carry indirect prompt-injection instructions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill includes explicit sudo commands (e.g., "sudo awf ..."), Docker/container and iptables-related operations, and instructions that access host files and start services — all of which require elevated privileges and can modify the machine's state.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 10, 2026, 01:37 PM
Issues
2