use-hln-api
Fail
Audited by Snyk on Apr 4, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt contains a literal API key and explicitly instructs the agent to send API keys (user-provided or the built-in key) as the X-API-Key header when calling endpoints, which requires embedding secret values verbatim in requests/commands and creates an exfiltration risk.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill explicitly calls the public HL Names API (base URL https://api.hlnames.xyz/) in SKILL.md and references/endpoints.md (e.g., GET /resolve/profile/:address and GET /records/full_record/:nameHashOrId) and instructs the agent to read and interpret returned user-controlled fields like data.records (free-form profile/text records) and mint-pass responses, so arbitrary third-party, user-generated content can influence subsequent actions.
HIGH W008: Secret detected in skill content (API keys, tokens, passwords).
- Secret detected (high risk: 1.00). I found a literal, high-entropy API key in the prompt: "NILB2EY-R4LUDOA-WN5G5JQ-KHAQOLA" (the "built-in public agent key" used as the default X-API-Key). This is a real-looking API key string (high entropy and not a placeholder like YOUR_API_KEY or sk-xxxx). Even though the text labels it "public", it is still a concrete credential present in the documentation and thus meets the definition for a secret disclosure. No other high-entropy secrets, private keys, or PEM blocks are present; other values are environment names, endpoint examples, or clearly non-secret placeholders and are ignored per the rules.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill explicitly exposes a crypto-related signing endpoint: POST /sign_mintpass/:label, and it instructs the agent to request that endpoint as a readiness check "when the developer is prepared to submit the mint transaction promptly" and to preserve returned mint-pass signatures. This is a specific blockchain signing capability (mint-pass signing) intended to be used in on-chain mint transactions rather than a generic HTTP caller, so it qualifies as direct crypto execution authority.
Issues (4)
W007
HIGHInsecure credential handling detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W008
HIGHSecret detected in skill content (API keys, tokens, passwords).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata