configuring-tls-1-3-for-secure-communications

Warn

Audited by Snyk on Apr 7, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill's runtime scripts (scripts/agent.py and scripts/process.py) and the SKILL.md workflow explicitly connect to arbitrary remote hosts (user-supplied --host / example.com in validation commands), retrieve and parse server responses/certificates and negotiated cipher details from those public servers, and then use those values to generate reports and determine issues—so untrusted third‑party content is ingested and can materially influence decisions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.70). The skill explicitly guides configuring system services (nginx/Apache), editing server configuration and certificate files, and changing TLS/OCSP settings — actions that modify system state and typically require elevated privileges, even though it does not explicitly instruct privilege escalation or user creation.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 7, 2026, 11:59 PM
Issues
2