deploying-tailscale-for-zero-trust-vpn

Fail

Audited by Snyk on Mar 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The prompt includes explicit examples of pre-auth keys and authkey usage embedded directly in commands and YAML (e.g., --authkey=tskey-auth-xxxxx, TS_AUTHKEY in stringData), which encourages asking for and inserting real secret values verbatim into outputs/commands.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The prompt explicitly instructs privileged, state-changing operations (e.g., multiple sudo commands, editing /etc/sysctl.conf, moving binaries into /usr/local/bin, configuring system services, adding NET_ADMIN/sys_module capabilities, and running a control server), which would modify the host system and require elevated privileges.

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 16, 2026, 03:02 AM
Issues
3