building-devsecops-pipeline-with-gitlab-ci

Warn

Audited by Snyk on Apr 17, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill's code and configuration explicitly fetch and consume external, user-provided content—e.g., .gitlab/sast-ruleset.toml includes passthrough URLs to semgrep.dev rules (https://semgrep.dev/...) and scripts/process.py and scripts/agent.py call arbitrary GitLab API endpoints (defaulting to https://gitlab.com or a provided gitlab_url) to ingest project/vulnerability/job data—which are untrusted third‑party/user-generated sources and are parsed to drive reporting and pipeline decisions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.70). The .gitlab/sast-ruleset.toml includes semgrep passthrough URLs (https://semgrep.dev/p/owasp-top-ten and https://semgrep.dev/p/java) which are likely fetched at CI/runtime by the SAST/semgrep analyzer to load rules that directly control scanner behavior, so they are runtime external dependencies that can alter instructions the tool follows.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 17, 2026, 10:03 AM
Issues
2