cicd-jenkins-debian
Warn
Audited by Snyk on Apr 28, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The skill installs Jenkins at runtime using the APT repository and key (https://pkg.jenkins.io/debian-stable/ and https://pkg.jenkins.io/debian-stable/jenkins.io-2023.key), which are required external resources fetched during setup and result in remote packages being downloaded and executed on the host.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs privileged system changes (sudo apt installs, adding apt repos and keys, editing /etc, systemctl enable/start/restart, useradd/usermod, and reading secrets) and creation of users, which would modify and compromise the host machine's state if executed.
Issues (2)
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata