CtrlK
BlogDocsLog inGet started
Tessl Logo

tdg-personal/canary-watch

Use this skill to monitor a deployed URL for regressions after deploys, merges, or dependency upgrades.

44

Quality

44%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

Overview
Quality
Evals
Security
Files

Security

1 medium severity finding. This skill can be installed but you should review these findings before use.

Medium

W011: Third-party content exposure detected (indirect prompt injection risk)

What this means

The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.

Why it was flagged

Third-party content exposure detected (high risk: 0.90). The SKILL.md explicitly instructs the agent to fetch and monitor arbitrary deployed URLs (e.g., "/canary-watch https://myapp.com" and compare staging vs production) and to read page content, console errors, network requests, and DOM elements — i.e., untrusted public web content that the agent will interpret and use to make decisions.

Report incorrect finding
Audited
Security analysis
Snyk