skiplagged-travel-search
Warn
Audited by Snyk on Feb 16, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill connects to the external Skiplagged MCP server at https://mcp.skiplagged.com/mcp and explicitly requires the agent to call those public search tools and ground responses on the returned flight/hotel results, so it ingests untrusted third-party content as part of its workflow.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The skill requires a runtime connection to the remote MCP server at https://mcp.skiplagged.com/mcp to discover and invoke Skiplagged MCP tools, which execute remote tool logic (i.e., remote code) and directly drive agent behavior.
Audit Metadata