migrate-bluejay

Fail

Audited by Snyk on Apr 9, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt instructs the agent to collect API keys (from arguments or by asking the user) and embed them directly into curl headers and requests (e.g., -H "X-API-Key: "), which requires the LLM to handle and output secret values verbatim.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly fetches and ingests content from the external Bluejay API (e.g., "Step 1: Inventory" using endpoints like GET /v1/all-agents, /v1/custom-metrics, /v1/communities in references/bluejay-api.md), and that untrusted/user-generated Bluejay data (prompts, knowledge bases, custom metrics, community posts, digital-human scripts) is read and directly used to build prompts, metrics, personas, and run templates that materially influence subsequent API calls and actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The skill runtime fetches Bluejay prompt and knowledge-base content from https://api.getbluejay.ai (e.g., GET /v1/agents/{agent_id}/prompts?label=latest and /v1/agents/{agent_id}/knowledge-bases/versions?page_size=1) and directly injects that content into migrated Coval agent/persona prompts, meaning remote content controls agent instructions.

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
HIGH
Analyzed
Apr 9, 2026, 11:43 AM
Issues
3