py-subprocess
Fail
Audited by Snyk on Apr 20, 2026
Risk Level: CRITICAL
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The code reads a secret from an environment variable and directly interpolates it into a subprocess curl command (embedding the secret in the URL), which requires the agent to include the secret verbatim and thereby exfiltrate it.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This code intentionally reads a sensitive API key from the environment and sends it to an untrusted external endpoint via a subprocess curl call, constituting deliberate credential theft and data exfiltration.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The snippet reads a secret API key from the host environment and immediately exfiltrates it to an external server via subprocess/curl, which directly compromises the machine's confidentiality/security.
Issues (3)
W007
HIGHInsecure credential handling detected in skill instructions.
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata