distributed-job-safety

Warn

Audited by Snyk on Mar 5, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's Deployment Checklist explicitly instructs pulling remote code and packages (e.g., "ssh host 'cd ~/project && git fetch origin main && git reset --hard origin/main'" and "uv pip install ...") and then inspects that fetched source (inspect.getsource()) to decide actions like restart vs force-refresh, so untrusted public content from Git/PyPI is fetched and interpreted in the required workflow, enabling indirect prompt-injection risk.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.80). The skill's deployment steps explicitly fetch and install remote code at runtime (e.g., git operations and package installs such as "git fetch/reset" and "uv pip install" referencing remotes like https://github.com/owner/repo.git and https://pypi.org/simple/), which would cause execution of externally fetched code on the target host (flagging https://github.com/owner/repo.git as an example runtime external code source).
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 5, 2026, 12:52 PM