claude-code-proxy-patterns

Warn

Audited by Snyk on May 11, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The SKILL.md and references clearly show the local proxy forwards /v1/messages to external Anthropic-compatible providers (e.g., MiniMax at https://api.minimax.io/anthropic in WP-08 and references/provider-compatibility.md and the launchd plist), and the proxy parses/forwards provider response content (including "thinking" / "base_resp" blocks), so untrusted third-party API responses are ingested and can materially influence the agent's behavior.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill instructs installing a system-level proxy binary (/usr/local/bin), creating a launchd plist under /Library/LaunchDaemons, and modifying persistent environment/service configuration—actions that modify protected system files and persist a privileged service, which can compromise the machine state.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
MEDIUM
Analyzed
May 11, 2026, 01:41 AM
Issues
2