security-scanner

Fail

Audited by Snyk on Apr 14, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.80). The scanner explicitly fetches "raw file content exactly as‑is" (including local and GitHub files) and has no instructions to redact secrets, so the LLM will receive sensitive values in context and may output them in reports — creating an exfiltration risk.

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.80). The list mixes legitimate-looking GitHub repo and raw.githubusercontent.com endpoints (which can host scripts/binaries and are safe only after inspection) with explicit malicious/third‑party domains (evil.com, attacker.com) and raw-download patterns that are commonly used to distribute executable payloads, so the set should be treated as suspicious and verified before downloading or executing anything.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly fetches and ingests files from public GitHub URLs (Step 2-URL: converting blob URLs to raw.githubusercontent.com and using the GitHub API to fetch repo contents) and then reads SKILL.md/README and other repo files for analysis, which are untrusted third‑party contents that can contain instructions capable of influencing the agent's decisions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (4)

W007
HIGH

Insecure credential handling detected in skill instructions.

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 14, 2026, 01:30 PM
Issues
4