configuring-tls-1-3-for-secure-communications
Warn
Audited by Snyk on Apr 7, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill's runtime scripts (scripts/agent.py and scripts/process.py) and the SKILL.md workflow explicitly connect to arbitrary remote hosts (user-supplied --host / example.com in validation commands), retrieve and parse server responses/certificates and negotiated cipher details from those public servers, and then use those values to generate reports and determine issues—so untrusted third‑party content is ingested and can materially influence decisions.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.70). The skill explicitly guides configuring system services (nginx/Apache), editing server configuration and certificate files, and changing TLS/OCSP settings — actions that modify system state and typically require elevated privileges, even though it does not explicitly instruct privilege escalation or user creation.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata