golang-database-patterns
Fail
Audited by Snyk on Feb 15, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt includes examples that embed plaintext credentials and DSNs directly in commands and code (e.g., migrate -database "postgres://user:pass@..."; sqlx.Connect("postgres://test:test@...")), which encourages including secret values verbatim in LLM outputs and is a high exfiltration risk.
Audit Metadata