Frame

Warn

Audited by Snyk on Mar 12, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). Yes — the skill's required workflow explicitly calls MCP tools that fetch user-authored Figma/FigJam content (e.g., get_design_context(file_url="https://figma.com/file/XXX"), get_figjam, get_code_connect_map shown in references/execution-templates.md and references/figma-mcp-server-ga.md), and those untrusted/third‑party artifacts (including Code Connect snippets/custom guidance) are read and used to make mapping/extraction/sync decisions, so they could carry indirect prompt-injection instructions.

Issues (1)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 12, 2026, 02:00 AM
Issues
1