building-devsecops-pipeline-with-gitlab-ci
Warn
Audited by Snyk on Apr 17, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.70). The skill's code and configuration explicitly fetch and consume external, user-provided content—e.g., .gitlab/sast-ruleset.toml includes passthrough URLs to semgrep.dev rules (https://semgrep.dev/...) and scripts/process.py and scripts/agent.py call arbitrary GitLab API endpoints (defaulting to https://gitlab.com or a provided gitlab_url) to ingest project/vulnerability/job data—which are untrusted third‑party/user-generated sources and are parsed to drive reporting and pipeline decisions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.70). The .gitlab/sast-ruleset.toml includes semgrep passthrough URLs (https://semgrep.dev/p/owasp-top-ten and https://semgrep.dev/p/java) which are likely fetched at CI/runtime by the SAST/semgrep analyzer to load rules that directly control scanner behavior, so they are runtime external dependencies that can alter instructions the tool follows.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata