sirv-api

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The prompt includes examples that embed clientId/clientSecret in a POST and Bearer tokens directly in Authorization headers (curl and code examples), which instructs the agent to place secret values verbatim into requests/outputs and thus poses a high exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill interacts with the public Sirv API (e.g., GET /v2/files/download, POST /v2/files/search and directory listing endpoints on https://api.sirv.com) which can return arbitrary user-uploaded / public images and files that the agent would fetch and read as part of its workflow, exposing it to untrusted third-party content.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 10:07 AM