vaex-dataframes

Warn

Audited by Snyk on May 15, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly documents loading untrusted external data and pipeline/state files from third-party locations (e.g., vaex.open('s3://...'), vaex.open('ws://server-host:9000/...') and df.state_load('/tmp/pipeline.json') in the "Cloud Storage / Vaex Server" and "State Files (Pipeline Persistence)" sections), and those state/pipeline JSONs and remote DataFrames are parsed/applied by Vaex (creating virtual columns, ML transformers, selections, and predictions), so external, user-generated content would be interpreted as part of the workflow and could materially change subsequent computations or actions.

Issues (1)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
MEDIUM
Analyzed
May 15, 2026, 02:22 AM
Issues
1