apify-actorization
Warn
Audited by Snyk on Mar 5, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's workflow explicitly runs web crawlers on arbitrary startUrl input (see "apify run --input '{"startUrl": ...}'" in SKILL.md and the PlaywrightCrawler examples in references/js-ts-actorization.md and references/python-actorization.md), which causes the agent to fetch and interpret untrusted public web pages whose content can influence processing and subsequent actions.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill documentation explicitly describes monetization and a programmatic charge API: "Pay Per Event (PPE)" and the example "Charge for events in your code with await Actor.charge('result')". That is a specific API/function to perform a charge (move money) rather than a generic tool (browser, HTTP, or CLI). Because it contains an explicit "charge" operation for billing users, it grants direct financial execution capability.
Audit Metadata