credentials

Fail

Audited by Snyk on Apr 9, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill asks for a path or manual entry of API keys, parses and extracts raw secret values from the file, and instructs writing/validating those keys (e.g., creating a .env or embedding them in commands), which would require the LLM to handle or output secrets verbatim despite some masked-print examples.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned the entire skill prompt for literal, high-entropy credential values. Most occurrences are placeholders or intentionally masked (e.g., "sk-proj-xxxxx", "rnd_xxxxx", "sk-ant-xxx...", "OPENAI_API_KEY" names, truncated examples like "Y1FgKA..." or "-QLoYd..."), which I ignored per the rules.

However, the "Mixed/Informal" example contains two full, non-truncated, high-entropy strings that look like a Reddit client id/secret pair:

  • client id: Y1FgKALKmb6f6UxFtyMXfA
  • secret: -QLoYdxMqOJkYrgk5KeGPa6Ps6vIiQ

These are not labeled as placeholders, are high-entropy/random-looking, and match the kind of real credentials the detection rules are meant to catch. Therefore I treat them as real, hardcoded secrets present in the documentation.

All other potentially matching tokens in the prompt are either placeholders, masked/truncated, example labels, or low-entropy setup values and were ignored.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W008
HIGH

Secret detected in skill content (API keys, tokens, passwords).

Audit Metadata
Risk Level
HIGH
Analyzed
Apr 9, 2026, 07:27 PM
Issues
2