NYC

http-client

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The usage examples show embedding an Authorization: Bearer token directly in command-line headers, which encourages the LLM to output secret values verbatim in generated commands and therefore creates an exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill accepts an arbitrary URL (args.url) and uses requests.request(...) to fetch remote HTTP responses which it then parses and prints (format_response reads response.text and response.json()), so it clearly ingests untrusted public third‑party content provided via arbitrary URLs.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 01:48 AM