codex-auth

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt contains multiple patterns that require embedding API keys/secrets verbatim into files, commands, Docker build args, and prompts (e.g., hardcoded config.toml entries, export OPENAI_API_KEY="sk-...", security add-generic-password -w "...", read-p then export), which forces the LLM or agent to handle and potentially output secret values directly.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs use of privileged operations (e.g., "sudo apt-get install pass"), filesystem-modifying commands (chmod, rm -rf ~/.codex/credentials), and repeatedly uses a flag to bypass approvals/sandbox ("--dangerously-bypass-approvals-and-sandbox"), which encourages circumventing security controls and modifying the host state.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 01:11 AM