iros-registry-automation
Warn
Audited by Snyk on Apr 30, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). The skill's workflow explicitly automates browsing and interacting with the public Internet등기소 site (https://www.iros.go.kr) using Playwright scripts (e.g., iros_cart.py, iros_cart_by_corpnum.py, iros_download.py) so the agent reads and acts on live third-party webpage content which can materially influence subsequent tool actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill explicitly instructs users at runtime to git clone and run code from https://github.com/challengekim/iros-registry-automation (git clone https://github.com/challengekim/iros-registry-automation.git and running its Python scripts), which fetches remote code that will be executed and is a required upstream dependency, so it can directly control execution.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata