klix-integration
Fail
Audited by Snyk on Apr 9, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt embeds explicit Brand ID and Secret Key values and shows Authorization: Bearer headers, which encourages or requires including secret tokens verbatim in generated code/commands and thus creates an exfiltration risk.
HIGH W008: Secret detected in skill content (API keys, tokens, passwords).
- Secret detected (high risk: 1.00). I scanned for high-entropy, literal credentials that could be used to access services.
Flagged:
- The two "Secret Key" values under "Test Environment" are high-entropy, base64-like bearer tokens and are presented as credentials to use in the test environment:
- Secret Key (full features): IB-bzOdJLgJjbsaA34Qpxkg1TTIrW-iDuni6JuzbP--KgtsREHzvIvLLTH8E5T0CZcSbYM3qNmfeogpWW_RZaA==
- Secret Key (simple): No51P_Dq4jQGeha6_eQpfjAFe67u3QYHEO95jrcCux0zPfByd8x9poSa6xINQPz1hyUGKNYoxa16rnUkSUI_MA== These are literal bearer-style secrets (used in Authorization: Bearer ), high-entropy, and directly present — therefore they meet the definition of secrets.
Ignored / not flagged (with reasons):
- Brand ID
702314b8-dd86-41fa-9a22-510fdd71fa92: an identifier/UUID (low entropy) used to identify the brand; not a high-entropy secret and typically insufficient by itself to grant access. - Test card numbers, CVVs, expiries and the "3DS Password: hint": test card data intended for sandbox/testing. They are numeric/low-entropy test values and documented as test cards — treated as test examples, not high-entropy service credentials.
- Authorization header examples and placeholders (e.g.,
Authorization: Bearer <SECRET_KEY>,<BRAND_ID>,<PURCHASE_ID>): placeholders and header names are documentation artifacts and explicitly listed in the ignore rules.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill is explicitly designed to integrate a payment gateway (Klix) and exposes concrete, named API endpoints and workflows that create and execute monetary transactions. It includes bearer Secret Keys and test credentials and documents endpoints for POST /purchases/ (create a purchase/checkout), POST /purchases//capture/ (capture reserved funds), POST /purchases//charge (charge recurring payments), POST /purchases//release/ (release holds), and bulk PIS payment fields — all of which directly initiate, capture, charge, or release funds. This is a payment-gateway integration (specific financial execution), not a generic tool, so it meets the Direct Financial Execution criteria.
Issues (3)
W007
HIGHInsecure credential handling detected in skill instructions.
W008
HIGHSecret detected in skill content (API keys, tokens, passwords).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata