performing-endpoint-vulnerability-remediation

Warn

Audited by Snyk on Apr 9, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill's scripts/process.py explicitly fetches and ingests public third‑party data (fetch_cisa_kev() loads the CISA KEV JSON from https://www.cisa.gov/... and fetch_epss_scores() queries the FIRST EPSS API), and those external values are used in prioritization logic that directly determines remediation priority/SLA and downstream actions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill includes explicit privileged system-modifying instructions (PowerShell commands to install updates, change services, and edit HKLM registry keys) that direct the agent to alter the machine's state and require administrative/sudo privileges.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 9, 2026, 06:49 PM
Issues
2