skills/mukul975/anthropic-cybersecurity-skills/performing-sca-dependency-scanning-with-snyk/Gen Agent Trust Hub
performing-sca-dependency-scanning-with-snyk
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The scripts
scripts/agent.pyandscripts/process.pyusesubprocess.runto execute the Snyk CLI. Commands are built as argument lists and executed without a shell, mitigating the risk of shell injection vulnerabilities. - [EXTERNAL_DOWNLOADS]: The skill facilitates the installation of the Snyk CLI and references official Snyk GitHub Actions. These resources originate from a well-known security service provider and are documented as legitimate parts of the SCA workflow.
- [CREDENTIALS_UNSAFE]: The skill avoids hardcoded secrets, correctly instructing users to manage the
SNYK_TOKENusing environment variables or repository secrets. - [PROMPT_INJECTION]: The skill processes output from Snyk scanning which involves reading external dependency manifests, creating a surface for indirect prompt injection.
- Ingestion points: Vulnerability data is ingested from Snyk CLI JSON output in
scripts/agent.py(line 123) andscripts/process.py(line 62). - Boundary markers: Absent; the scripts parse the structured JSON output directly.
- Capability inventory: The scripts execute the Snyk CLI via
subprocess.runand write report files to the local filesystem. - Sanitization: Package names and vulnerability titles are not explicitly sanitized before inclusion in reports or SARIF output.
Audit Metadata