wordpress-admin

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt contains plaintext credentials (e.g., FTP password in the lftp command and local admin/admin123) and example commands that embed secrets directly, so the agent may be required to output secret values verbatim.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned the entire skill prompt and flagged only values that appear to be real, literal credentials (high-entropy, usable values).

Findings:

  • The lftp command includes a literal FTP credential: lftp -u "alfonso@csrdevelopment.com",'@#s;v1#%1M$+' ftp.csrdevelopment.com — the password '@#s;v1#%1M$+' is a 12-character, random-looking string with mixed symbols and digits, which meets the "high-entropy literal value" definition and appears directly usable. This is a hardcoded secret and should be treated as leaked credentials.
  • Ignored items:
  • admin / admin123 (Local Docker admin credentials) — low-entropy example/setup password; per the rules this is not flagged.
  • "BASE64_CREDENTIALS", API_KEY, and file paths (/root/.pexels-api-key, /root/.unsplash-api-key) — placeholders or references to where keys should be stored, not actual keys.
  • Any other obvious placeholders or example strings (e.g., "YOUR_API_KEY", "API_KEY") — ignored per the guidelines.

Recommendation: Remove the inline FTP password, rotate it immediately if it is valid, and move credentials to a secrets store or environment variables.


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The skill contains many commands that run as root or against /root-owned files, instructs modifying site/theme files and restarting/resetting Docker (including destructive docker-compose down -v), and includes credentials and FTP upload scripts—actions that directly change the host/container state and can compromise the machine.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 11:58 PM