act-local-testing

Fail

Audited by Snyk on Mar 30, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly demonstrates and encourages embedding secrets verbatim (e.g., .secrets entries like GITHUB_TOKEN=ghp_your_token_here and inline commands act -s GITHUB_TOKEN=ghp_token), which would require an LLM to include secret values directly in generated commands or files.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.70). The skill includes instructions that explicitly require or encourage privilege escalation and system changes (e.g., "curl ... | sudo bash", "sudo act", "sudo usermod -aG docker $USER"), which modify system state and can compromise the host.

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 30, 2026, 02:41 PM
Issues
3