mjardevi-lunch

Fail

Audited by Snyk on Mar 13, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.80). The prompt instructs storing an API key in a plaintext .api_key file and shows examples of passing the key directly on the command line (e.g., "python scripts/get_lunch.py ee57b6b..."), which encourages handling and embedding secret values verbatim in commands/outputs.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned the whole skill. Most values are placeholders or setup instructions (e.g., "din_api_nyckel_här" and the instructions to copy .api_key.example) which I ignored as documentation placeholders/low-security setup text.

However, the Quick Start examples include the literal string "ee57b6b96d25120dd4e921a8e7c246f1" used as an API key in two example commands. That value is a high-entropy, random-looking hex string and is not labeled as a placeholder. Because it appears directly in runnable example commands, it could be a real, usable credential and should be treated as a potential secret leak.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W008
HIGH

Secret detected in skill content (API keys, tokens, passwords).

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 13, 2026, 12:17 PM
Issues
2