aws-cloudformation-cloudfront
Warn
Audited by Snyk on Feb 15, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.70). The skill includes nested stack TemplateURL entries (e.g., "TemplateURL: https://s3.amazonaws.com/bucket/cloudfront-static.yaml") which cause CloudFormation to fetch external templates from public S3 URLs, so untrusted third-party content is ingested and interpreted as part of the deployment workflow.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill includes CloudFormation nested TemplateURL entries that CloudFormation fetches at runtime (e.g. https://s3.amazonaws.com/bucket/cloudfront-static.yaml and https://s3.amazonaws.com/bucket/cloudfront-api.yaml or the substituted https://${ArtifactBucket}.s3.amazonaws.com/cloudfront-parent.yaml), and those remote templates are required runtime dependencies that directly control resources/execute provisioning logic.
Audit Metadata