blueprint
Warn
Audited by Snyk on Mar 25, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's blueprint workflow explicitly accepts and fetches external, public resources — e.g., "resource": "url", "git:directory" (GitHub) and "wordpress.org/plugins" in the "Resource References" and steps like "installPlugin", "writeFile" (data from a url), and "request" — meaning untrusted third-party content is ingested and can influence execution (installed plugin/theme code or fetched files) at runtime.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The blueprint supports runtime fetching of remote bundles and code (e.g., the example blueprint URL https://playground.wordpress.net/?blueprint-url=https://example.com/bundle.zip and direct resource URLs like https://example.com/plugin.zip or git:directory refs such as https://github.com/user/repo) which will be downloaded and installed/executed as plugins/themes, so external content can directly execute code and is a required dependency for those steps.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata