signal-sourcer

Fail

Audited by Snyk on Feb 21, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The skill content prescribes explicit, privacy-invasive data-collection and deanonymization techniques (pixel-based person-level tracking, scraping G2/Capterra + matching reviewers to LinkedIn, automated LinkedIn follower scraping with PhantomBuster, webhooking captured identities to external services) and even recommends GDPR-evading alternatives and stealthy outreach tactics — indicating deliberate abusive intent to exfiltrate and exploit personal data, though no backdoor/remote-exec/obfuscated malware is present.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill explicitly instructs scraping and ingesting public, user-generated content—e.g., competitor-signals Play 8 directs scraping G2/Capterra reviews, content-engagement and resources/tool-setup-guides.md describe Trigify capturing LinkedIn comment text and sending it to Clay, and multiple SKILL.md files list Crunchbase/press releases/job boards as detection sources—and requires the agent to read/interpret that content to score signals and trigger outreach, which exposes it to untrusted third-party input that can influence actions.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 21, 2026, 11:39 AM