Burp Suite Web Application Testing

Warn

Audited by Snyk on Mar 10, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill's workflow explicitly requires navigating to and intercepting HTTP traffic from arbitrary target web application URLs and analyzing responses (see Phase 1 "Navigate to target URL in browser" / Proxy > Intercept, Phase 5 "Enter target URL in URLs to scan", and sending requests from HTTP history to Repeater/Intruder), so it ingests untrusted third‑party web content that can materially influence subsequent actions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill explicitly directs installing Burp's CA into the browser/system trusted roots and configuring proxy-based HTTPS interception, which modifies system/trust state and can bypass TLS protections (a security-sensitive change that may require elevated privileges).
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 10, 2026, 03:51 AM