posthog-deploy-integration
Warn
Audited by Snyk on Mar 24, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill's Step 4 explicitly instructs cloning and running a public GitHub repository (git clone https://github.com/PostHog/posthog.git), which fetches and executes untrusted, user-hosted third-party content that can materially influence deployment actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The self-hosted deployment step directs cloning and running code from https://github.com/PostHog/posthog.git (git clone then docker compose up), which fetches remote code and causes it to be executed at runtime, so it is a runtime external dependency that can execute remote code.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata