posthog-deploy-integration

Warn

Audited by Snyk on Mar 24, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill's Step 4 explicitly instructs cloning and running a public GitHub repository (git clone https://github.com/PostHog/posthog.git), which fetches and executes untrusted, user-hosted third-party content that can materially influence deployment actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The self-hosted deployment step directs cloning and running code from https://github.com/PostHog/posthog.git (git clone then docker compose up), which fetches remote code and causes it to be executed at runtime, so it is a runtime external dependency that can execute remote code.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 24, 2026, 04:20 PM
Issues
2