creating-zed-extensions

Warn

Audited by Snyk on Feb 17, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The example DocsExtension clearly fetches and returns content from open/public sources — e.g., fetch_api_reference runs curl against https://api.github.com/repos/{library}/readme (and fetch_docs constructs docs.rs URLs) which ingests arbitrary, user-generated README/docs content that could contain injected instructions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The DocsExtension.run_slash_command implementation runs a curl subprocess at runtime to fetch https://api.github.com/repos/{library}/readme and returns the raw response in the SlashCommandOutput, so remote content is fetched during execution and can directly influence prompts or downstream behavior.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 17, 2026, 08:01 AM