implementing-threat-modeling-with-mitre-attack

Warn

Audited by Snyk on Apr 13, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill explicitly fetches and parses public ATT&CK STIX data (SKILL.md Step 1 uses requests.get on https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json and scripts/agent.py calls attackcti.attack_client() to retrieve groups/techniques), and that externally sourced content is directly read and used to build threat profiles, gap analyses, and remediation/prioritization decisions — i.e., third-party data can materially influence agent behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 13, 2026, 10:33 PM
Issues
2