railway-deployment
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 0.90). The prompt includes commands that set credentials inline (e.g.,
railway variables set --sealed DOCKER_PASSWORD=pass) and instructs copying/restoring variable values, which encourages embedding secret values verbatim in CLI commands or scripts, creating an exfiltration risk.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill ingests and displays untrusted third‑party content—e.g., deploying from GitHub repos and public Docker images and reading runtime output and HTTP responses via commands like
railway add --repo owner/repository,railway add --image ...,railway logs --deployment, andcurl https://your-service.railway.app/health—so the agent would read/interpret arbitrary user-generated content that could carry indirect prompt injections.
Audit Metadata