cloud-security

Fail

Audited by Snyk on Feb 26, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). This skill includes many examples that embed credentials directly in commands (e.g., export AWS_ACCESS_KEY_ID="AKIA...", aws cli with secret args, az login -p SECRET, pacu import_keys --access-key/--secret-key), which instructs or encourages the agent to handle and output secret values verbatim.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This skill contains explicit, actionable offensive techniques — including metadata/SSRF token theft and bypasses, commands to create/attach privileged IAM policies and access keys, instructions to update Lambda/Functions for exfiltration, use of Pacu and other exploitation frameworks, and other privilege-escalation/exfiltration recipes — which directly enable credential theft, privilege escalation and data exfiltration and therefore present a high likelihood of malicious abuse.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 26, 2026, 07:57 AM