dev

Warn

Audited by Snyk on May 4, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill explicitly supports exposing the dev server publicly (SKILL.md "Modes" — --funnel is "public on the internet") and scripts/boot.sh will open an agent-browser session at that baseUrl (AGENT_BROWSER_SESSION ... agent-browser open), and /ork:expect drives agent-browser against , meaning the agent will fetch and interpret externally-hosted page content as part of its workflow, so public/untrusted content could influence subsequent tool actions.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is a dev-loop boot tool, but its state and boot sequence explicitly reference API emulators and show "stripe" in the emulators list (and step 3 runs "emulate --seed " when an emulate.config.yaml exists). That indicates the skill can specifically spin up a Stripe (payment gateway) emulator as part of its runtime. Because Stripe is a payment gateway (a specific financial integration), this meets the "specific tools/APIs for Payment Gateways" criterion.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W009
MEDIUM

Direct money access capability detected (payment gateways, crypto, banking).

Audit Metadata
Risk Level
MEDIUM
Analyzed
May 4, 2026, 05:09 PM
Issues
2