plantuml-syntax

Warn

Audited by Snyk on Feb 15, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).


MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The C4 examples use PlantUML’s runtime !include to fetch and execute remote PlantUML definitions from URLs like https://raw.githubusercontent.com/plantuml-stdlib/C4-PlantUML/master/C4_Context.puml (and the related C4_Container.puml and C4_Component.puml), which are fetched at render time and directly inject/execute external code required for C4 diagrams.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 15, 2026, 08:52 PM