openai-responses

Warn

Audited by Snyk on Feb 15, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill includes built-in web_search (templates and guides show tools: [{type: 'web_search'}]) which fetches real-time results from the open web, plus file_search (user-uploaded files) and MCP integrations that call external MCP servers—all of which supply untrusted third-party or user-generated content that the agent is expected to read and interpret.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). This skill includes runtime MCP tool usage that passes server_url values (e.g. https://mcp.stripe.com) into openai.responses.create calls so the Responses API will contact those external MCP endpoints at runtime to discover/execute tools and return results that directly influence agent behavior — a remote endpoint that can control prompts/actions and execute code.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill explicitly documents MCP server integration with payment gateways, naming Stripe and providing a concrete example ("Get my Stripe balance") that uses an MCP server labeled 'stripe' with an authorization token. MCP is described as a built-in connector for external tools (Stripe, databases, custom APIs) and shows the flow for invoking those servers (including authorization and user approval). These are specific, non-generic references to a payment gateway API and an example of performing financial queries via that connector, which meets the criteria for Direct Financial Execution capability.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 15, 2026, 08:08 PM