capacitor-plugins
Fail
Audited by Snyk on Mar 26, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt explicitly instructs the agent to ask the user for a Capawesome license key and to place it into an npm auth command (e.g.,
npm config set //.../:_authToken <YOUR_LICENSE_KEY>), which requires the LLM to accept and embed a secret value verbatim in output, creating an exfiltration risk.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The skill explicitly instructs configuring and installing Capawesome Insiders packages from the private npm registry https://npm.registry.capawesome.io at runtime (via npm config / npm install), which will fetch remote npm packages that the project depends on and can run install scripts or otherwise execute code locally.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill explicitly lists payment gateway plugins (e.g., @capacitor-community/stripe, @capacitor-community/stripe-terminal, @capawesome-team/capacitor-square-mobile-payments). These are specific payment SDKs/plugins (Stripe, Square) used to accept/process payments and thus provide direct financial execution capability rather than a generic tool. Therefore it meets the criteria for Direct Financial Execution.
Issues (3)
W007
HIGHInsecure credential handling detected in skill instructions.
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata