vercel-deploy

Fail

Audited by Snyk on Feb 25, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The skill deliberately packages and uploads the user's project to an external, non‑official endpoint (https://codex-deploy-skills.vercel.sh) and even instructs requesting escalated network permissions to bypass sandboxing, which enables unauthorized data exfiltration and potential takeover of deployments (it does not contain obfuscated payloads or explicit remote‑exec/backdoor code, but the upload + permission escalation is a high‑risk intentional behavior).

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill's deploy script (scripts/deploy.sh) posts the project to a third-party endpoint and then curls/polls the returned preview URL (PREVIEW_URL) — i.e., it fetches and interprets HTTP responses from arbitrary user-deployed public sites — so untrusted third-party content can influence the agent's workflow.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 25, 2026, 07:39 PM