cicd-expert
Fail
Audited by Snyk on Feb 15, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 0.80). Most secret usage in the prompt correctly references platform secrets or environment variables (safe), but the GitLab CI example includes a literal plaintext password (POSTGRES_PASSWORD: testpass), so the prompt contains an actual secret string and thus poses a risk of verbatim secret exposure.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The GitHub Actions workflow uses an external action "uses: aquasecurity/trivy-action@master" which fetches and executes remote code from https://github.com/aquasecurity/trivy-action at runtime and is relied on by the Security Scan job (making it a required external code execution dependency).
Audit Metadata