cron

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes an example that embeds a plaintext password in a command line (mysqldump -p'password'), which directs the agent to handle and output secret values verbatim—an insecure exfiltration pattern.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). This skill includes explicit instructions to edit system-wide crontab files (/etc/crontab, /etc/cron.d, /etc/cron.daily), use crontab -u (requires root), and place/permission scripts in system directories, all of which modify system state and require elevated privileges.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 08:52 PM