claude-cli

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.80). The prompt includes examples that embed secrets directly in CLI arguments and config files (e.g., --env AIRTABLE_API_KEY=YOUR_KEY, .mcp.json "env": {"API_KEY":"value"}, and podman -e GITHUB_PERSONAL_ACCESS_TOKEN "your-token"), which would encourage the agent to accept and emit secret values verbatim in commands/configs.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill lets the agent load and interact with external, potentially untrusted third-party services and content—e.g., adding MCP servers from arbitrary URLs (claude mcp add --transport http/sse ... https://mcp.sentry.dev/mcp, etc.) and browsing/installing plugins from a marketplace (claude plugin marketplace / claude plugin install ...@my-marketplace), which the agent is expected to read/use as part of its workflow.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill includes runtime Model Context Protocol endpoints (e.g., "claude mcp add --transport http sentry https://mcp.sentry.dev/mcp" and "claude mcp add --transport sse asana https://mcp.asana.com/sse") that the CLI connects to during execution to stream context/instructions, which can directly influence agent prompts or provide remote-executed behavior.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly exposes flags to bypass permission checks (e.g., --permission-mode bypassPermissions, --dangerously-skip-permissions) and instructs running arbitrary MCP server commands (npx, node, podman, stdio servers) and adding directories, which enable executing external processes and altering the machine state.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 12:24 AM