cron
Fail
Audited by Snyk on Feb 15, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt includes an example that embeds a plaintext password in a command line (mysqldump -p'password'), which directs the agent to handle and output secret values verbatim—an insecure exfiltration pattern.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.80). This skill includes explicit instructions to edit system-wide crontab files (/etc/crontab, /etc/cron.d, /etc/cron.daily), use crontab -u (requires root), and place/permission scripts in system directories, all of which modify system state and require elevated privileges.
Audit Metadata