moai-testing-load
Warn
Audited by Snyk on Mar 2, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.70). The skill's SKILL.md and examples.md include k6/Gatling scripts that fetch public URLs (e.g., https://httpbin.org, various https://*.example.com endpoints and a remote library at https://jslib.k6.io/papaparse/...), parse JSON/headers (extracting productId, X-DB-Time, etc.), and use that content to drive subsequent requests and CI decisions, which clearly ingests untrusted third‑party web content that can influence tool behavior.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The k6 example imports and executes remote code at runtime from https://jslib.k6.io/papaparse/5.1.1/index.js (import papaparse ...), which is a required dependency for that script and therefore allows external code to control execution.
Audit Metadata