session-scan

Warn

Audited by Snyk on Mar 10, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill spawns subagents that explicitly call mcp__ccrider__get_session_messages (SKILL.md, Step 5) and the scorer (references/compute-metrics.py) ingests and interprets those user session JSON messages (user-generated content) to compute scores and make decisions, exposing the agent to untrusted third‑party content that can influence actions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill explicitly instructs spawning subagents with mode="bypassPermissions" (to gain Write+Bash), runs arbitrary python/bash commands, and writes/removes files on the host—i.e., it directs bypassing permission controls and executing code on the machine, which risks compromising the host state.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 10, 2026, 11:41 PM