harness-keycloak-auth

Warn

Audited by Snyk on Feb 27, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The pipeline Run steps explicitly curl and parse responses from ${KEYCLOAK_URL} (e.g., token and clients endpoints like "${KEYCLOAK_URL}/realms/.../protocol/openid-connect/token" and "${KEYCLOAK_URL}/admin/realms/.../clients"), using returned JSON (parsed with jq) to decide whether to create/update clients and to store secrets, so arbitrary external Keycloak API responses specified by the pipeline variable can directly influence actions.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 27, 2026, 07:27 PM