github-url-intercept
Warn
Audited by Snyk on Apr 26, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). This skill's SKILL.md explicitly instructs the agent to parse any github.com URL and call GitHub APIs or scripts (e.g., gh api "repos/{owner}/{repo}/pulls/comments/{id}" and get_pr_context.py) to fetch PRs, issues, files and comments — public, user-generated GitHub content that the agent reads and uses to answer questions, so it clearly exposes the agent to untrusted third‑party content.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). This skill automatically fetches GitHub URLs at runtime (e.g., https://github.com/owner/repo/pull/123) via local scripts or gh api and then injects the returned file/PR/comment JSON into the agent's context to answer user queries, which clearly allows externally authored content to control prompts/outputs (prompt-injection risk).
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata