commafeed-api

Fail

Audited by Snyk on Mar 7, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill tells the agent to ask the user for COMMAFEED_USER/COMMAFEED_PASS if environment variables are missing and the examples/commands embed those credentials directly in curl commands (e.g. -u "$COMMAFEED_USER:$COMMAFEED_PASS"), which forces the LLM to handle and potentially output secrets verbatim.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly fetches and ingests arbitrary public feed/web content (e.g., /rest/feed/fetch for probe-by-URL and /rest/category/entries which returns entry.content and entry.url from external RSS feeds) and the SKILL.md shows workflows and example code that read those entries and then perform follow-up actions (e.g., choosing entries to star or subscribing based on fetched feed info), so untrusted third-party content can influence tool use and next actions.
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 7, 2026, 08:12 PM