setup

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly instructs the agent to ask the user to paste their Claude/Anthropic token and then insert that token into .env (e.g., via echo "CLAUDE_CODE_OAUTH_TOKEN=" > .env), which requires the LLM to receive and embed secret values verbatim — a direct exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The setup reads and processes arbitrary WhatsApp messages (e.g., capturing chat JIDs from store/messages.db and registering WhatsApp chats/groups as the "main" control channel), so untrusted, user-generated content from those chats will be ingested and interpreted by the agent, enabling indirect prompt injection.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). This skill instructs the agent to create and load a persistent launchd service, install/start container runtimes, write persistent config files (including mount allowlists and .env with credentials) and run build/start commands that change the host environment and grant agent access to host files, which clearly modifies system state and can compromise the machine.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 01:17 PM