terra-auth
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFE
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): Hardcoded Terra API credentials for multiple environments including production.
- Evidence: The file
SKILL.mdcontains explicitdev_idandapi_keyvalues for testing, staging, and production environments (e.g.,botaniqalmedtech-prod-yrc99AwsT2). - Impact: Anyone with access to the skill can authenticate as the 'botaniqalmedtech' entity, potentially accessing sensitive health data or modifying integrations.
- [DATA_EXFILTRATION] (HIGH): The skill documentation encourages and provides code for accessing sensitive local credential files.
- Evidence: Code snippets explicitly read from
.env.terra.productionand.env.terra.stagingusingload_dotenv. - [INDIRECT_PROMPT_INJECTION] (MEDIUM): The skill exposes an attack surface by accepting unvalidated external URLs and reference IDs that are passed to the Terra API.
- Ingestion points:
generate_widget_sessionfunction inSKILL.md. - Boundary markers: None present.
- Capability inventory: Makes network requests to
api.tryterra.covia theterraSDK. - Sanitization: No evidence of URL validation or input escaping before passing data to the SDK.
Recommendations
- AI detected serious security threats
Audit Metadata