pp-company-goat
Warn
Audited by Snyk on May 8, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). This skill explicitly fetches and processes live public third‑party content (SEC EDGAR Form D, GitHub, Hacker News/Algolia, Wikidata, Companies House, RDAP/WHOIS, etc.) as shown in the SKILL.md commands like snapshot, funding, mentions, and signal, and agents are expected to read/interpret those results to make decisions (e.g., signal flags and funding influence actions), so untrusted third‑party content can materially influence behavior.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The skill explicitly requires installing and running remote code as a prerequisite — e.g., via npx -y @mvanhorn/printing-press or go install github.com/mvanhorn/printing-press-library/library/developer-tools/company-goat/cmd/company-goat-pp-cli@latest — which fetches and executes remote code and is a required dependency at runtime (flagged URL: https://github.com/mvanhorn/printing-press-library/library/developer-tools/company-goat/cmd/company-goat-pp-cli@latest).
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata