personize-code-pipelines

Warn

Audited by Snyk on Mar 14, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly ingests open web and enrichment results (e.g., searchWithTavily(...) in pipelines/crm/hubspot-lead-review.ts and enrichment calls in multiple pipelines) and the Personize SDK notes MCP tools like Tavily/Exa are automatically available to ai.prompt()/agents.run(), so untrusted third-party web/news content is read and incorporated into prompts/memorized context that directly drives actions (email generation, follow-ups, escalations).

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill calls external enrichment APIs at runtime (e.g., https://api.tavily.com/search) and injects the returned research results into LLM prompts/memorization flows, meaning content fetched from that URL directly influences agent instructions and generation.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 14, 2026, 07:00 AM
Issues
2