saas-session-recon

Fail

Audited by Snyk on Mar 6, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill explicitly instructs extracting full cookie/token values (including HttpOnly via network captures) and embedding them verbatim into commands and code (e.g., Cookie headers in Bun/curl tests and a "credential extraction recipe"), which requires the LLM to handle and output secrets directly, creating a high exfiltration risk.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This skill provides explicit, step-by-step techniques to enumerate and extract session cookies (including HttpOnly via network captures), compute/forge auth tokens (e.g., SAPISIDHASH), and exfiltrate/pass them to an agent (native messaging) to enable a stealthy Chrome-extension API proxy and account takeover—constituting clear credential theft and unauthorized access behavior.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). This skill autonomously navigates to and scrapes live third‑party web apps and documentation (e.g., via navigate/read_page, read_network_requests, javascript_tool to enumerate cookies/localStorage and capture Set-Cookie/response headers, plus bun fetch of external docs in Phase 2.5), treating that untrusted web content as input to decide tests and generate credential‑extraction recipes — meeting all criteria for indirect prompt‑injection risk.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 6, 2026, 08:44 PM