manage

Warn

Audited by Snyk on Mar 7, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). This skill explicitly lets scheduled tasks grant the Claude agent web-browsing/fetch tools (e.g., "WebSearch", "WebFetch", "Bash(curl )") via the required permission-selection workflow (see SKILL.md Step 6: Permissions) and the permission_presets.py presets, and the generated wrappers pass those --allowedTools/permission-mode flags to the claude CLI (references/wrapper-template.sh/.ps1), so the agent can fetch and read arbitrary public web content that could contain instructions influencing subsequent actions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill creates and edits scheduled tasks and wrapper files on the host and explicitly exposes a "Bypass" option (--dangerously-skip-permissions / --permission-mode bypassPermissions) that directs the agent to skip permission checks, which can be used to bypass security controls and modify machine state.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 7, 2026, 03:57 AM