slidev-plantuml
Warn
Audited by Snyk on Feb 15, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill config and examples show PlantUML fetching external resources (the setup uses the public server https://www.plantuml.com/plantuml and the examples use !include URLs like https://raw.githubusercontent.com/plantuml-stdlib/...), so the renderer will ingest third-party public content that could contain untrusted/user-generated data.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill's PlantUML examples use !include to pull external PUML files at render time (e.g. https://raw.githubusercontent.com/plantuml-stdlib/C4-PlantUML/master/C4_Context.puml and https://raw.githubusercontent.com/plantuml-stdlib/C4-PlantUML/master/C4_Container.puml) and the configured PlantUML server (https://www.plantuml.com/plantuml) will fetch and inject that remote content during runtime, which directly controls the rendered instructions.
Audit Metadata