secondme-openclaw-connect

Fail

Audited by Snyk on Mar 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill asks the user to paste an authorization code (smc-...) into the chat and then explicitly instructs constructing a POST body containing that code and saving the returned accessToken into a credentials file, which requires the LLM to handle and embed secret token values verbatim (high exfiltration risk).

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly posts the user-provided auth code to the third-party API at https://app.mindos.com/gate/in/rest/third-party-agent/v1/auth/token/code, reads fields like accessToken, channelId, and relayUrl from that external response, and then updates local OpenClaw config—so untrusted third-party content can directly drive agent actions.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 16, 2026, 03:41 AM
Issues
2