reliability-engineering

Warn

Audited by Snyk on Feb 16, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill includes runtime code that fetches and processes arbitrary external URLs (e.g., createHttpCheck in templates/health-check.ts uses fetch(url) and the circuit-breaker usage example calls fetch('https://api.example.com/data') and processes the response), so it can ingest untrusted public third‑party content as part of its workflow.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (low risk: 0.30). The prompt includes destructive operational actions (Chaos Monkey terminating instances, kubectl rollout restart/scale) that modify system/cluster state, but it does not instruct privilege escalation, editing system files requiring sudo, or creating local user accounts, so the risk is present but limited.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 16, 2026, 01:04 AM