twilio-verify

Fail

Audited by Snyk on Mar 7, 2026

Risk Level: HIGH
Full Analysis

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned the entire skill prompt for literal values that look like real, usable credentials and applied the given rules (flag only high-entropy, directly present secrets; ignore placeholders and low-entropy example passwords).

Findings:

  • TWILIO_API_KEY_SECRET=9b2c3d4e5f60718293a4b5c6d7e8f9a0 — This is a high-entropy, hex-like string included verbatim in the example .env. It looks like a real API secret (not a placeholder like YOUR_API_KEY or sk-xxxx) and therefore qualifies as a hardcoded secret.
  • Other values such as TWILIO_ACCOUNT_SID=AC2f7c2c6b2d2f4a1b9a0b3c1d2e3f4a5 and TWILIO_VERIFY_SERVICE_SID=VA0a1b2c3d4e5f60718293a4b5c6d7e8f are service/account identifiers (SIDs). These are identifiers rather than secrets and are commonly included in examples; per the definition they do not by themselves grant access and are lower sensitivity, so I did not flag them.
  • TWILIO_API_KEY_SID appears as YOUR_API_KEY_SID (placeholder), and TWILIO_AUTH_TOKEN is set to a non-secret placeholder text; both are ignored.

Therefore there is at least one directly embedded, high-entropy secret (the API key secret).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt includes explicit privileged system modifications (sudo apt installs, writing files under /etc, and a systemd unit file) which instruct changing system state and require elevated privileges.
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 7, 2026, 05:48 PM