argocd-cli

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes an explicit plaintext password (admin / CpfsoneT7ogVKWOh) and shows/asks to use it verbatim in argocd login commands, forcing the LLM to handle and output the secret.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). High risk — the content includes plaintext administrative credentials and server endpoints that enable unauthorized access to ArgoCD and underlying clusters, constituting credential leakage and a potential account takeover.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). The prompt includes a literal, high-entropy credential: the ArgoCD admin password "CpfsoneT7ogVKWOh" (paired with username "admin") listed under "Credentials" and used verbatim in the argocd login command. It is not a placeholder, truncated value, or a simple example password — it appears to be a real, usable secret and is therefore flagged.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 15, 2026, 09:13 PM