mermaidjs-v11
Warn
Audited by Snyk on Mar 29, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill explicitly reads and renders arbitrary Mermaid diagram source from markdown/HTML (e.g., "mmdc -i README.template.md" in references/cli-usage.md and browser integrations that read .mermaid code blocks in references/integration.md), and also dynamically imports external icon packs and CDN modules (e.g., import('https://esm.run/...') and https://cdn.jsdelivr.net/), meaning untrusted/user-supplied third‑party content is ingested and can include clickable callbacks/HTML that materially affect runtime behavior.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The skill's runtime examples explicitly load and execute remote JavaScript (e.g., https://cdn.jsdelivr.net/npm/mermaid@latest/dist/mermaid.min.js), so it relies on fetching and running external code at runtime.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata