codex-auth
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt contains multiple patterns that require embedding API keys/secrets verbatim into files, commands, Docker build args, and prompts (e.g., hardcoded config.toml entries, export OPENAI_API_KEY="sk-...", security add-generic-password -w "...", read-p then export), which forces the LLM or agent to handle and potentially output secret values directly.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs use of privileged operations (e.g., "sudo apt-get install pass"), filesystem-modifying commands (chmod, rm -rf ~/.codex/credentials), and repeatedly uses a flag to bypass approvals/sandbox ("--dangerously-bypass-approvals-and-sandbox"), which encourages circumventing security controls and modifying the host state.
Audit Metadata