optimize-runbook

Fail

Audited by Snyk on May 7, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly instructs reading a token from ~/.config/jetty/token and embedding it into curl Authorization headers (e.g., -H "Authorization: Bearer $TOKEN"), which requires the agent to handle and could cause it to output secret values verbatim in commands/requests.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly fetches and ingests trajectory data and output files from the Jetty API (e.g., curl calls to https://flows-api.jetty.io/api/v1/db/trajectory/... and /api/v1/file/...), which are user-generated/untrusted run outputs that the agent must read and interpret to drive analysis and automatic runbook edits (Steps 2–5), so untrusted third-party content can materially influence tool actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
HIGH
Analyzed
May 7, 2026, 09:26 PM
Issues
3