performing-gcp-penetration-testing-with-gcpbucketbrute

Warn

Audited by Snyk on Apr 21, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill's runtime script (scripts/agent.py) actively queries and ingests data from external GCP resources—using gsutil to list public buckets and gcloud to fetch bucket IAM policies and project IAM bindings (and the README also references cloning GCPBucketBrute from a public GitHub) — these are untrusted, third-party/public sources whose JSON/listing contents are parsed and used to drive further tests and reporting.

Issues (1)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 21, 2026, 12:22 AM
Issues
1