act-local-testing
Fail
Audited by Snyk on Mar 30, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt explicitly demonstrates and encourages embedding secrets verbatim (e.g., .secrets entries like GITHUB_TOKEN=ghp_your_token_here and inline commands act -s GITHUB_TOKEN=ghp_token), which would require an LLM to include secret values directly in generated commands or files.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill's installation instructions run a remote install script via curl piped to bash (https://raw.githubusercontent.com/nektos/act/master/install.sh), which fetches and executes remote code as a required setup step.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.70). The skill includes instructions that explicitly require or encourage privilege escalation and system changes (e.g., "curl ... | sudo bash", "sudo act", "sudo usermod -aG docker $USER"), which modify system state and can compromise the host.
Issues (3)
W007
HIGHInsecure credential handling detected in skill instructions.
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata