NYC

slack-messaging

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt instructs extracting browser session tokens (xoxc/xoxd) and shows commands that embed those tokens directly as CLI arguments, requiring the agent to handle and output secrets verbatim.

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.80). The direct GitHub release link is potentially high-risk because it serves a prebuilt executable from an unfamiliar/low‑profile account (unknown maintainer, no vetting) which is a common malware distribution pattern, while the three slack.com workspace URLs are official Slack subdomains/placeholders and are low risk on their own.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). This skill reads and parses user-generated Slack content (e.g., via "slackcli conversations read", "conversations list", and message JSON output) from public/private channels and DMs, exposing the agent to untrusted third-party content that could carry indirect prompt injection.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The prompt instructs installing a binary into /usr/local/bin and changing its permissions (modifying system-wide filesystem locations that typically require sudo), which alters the machine's state and can be used to compromise it.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 15, 2026, 09:25 PM