stripe-reconcile

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly instructs the agent to set environment variables and run CLI commands that embed the Stripe webhook secret value verbatim (e.g., npx convex env set ... "whsec_..."/printf 'whsec_...'), which requires the LLM to handle and output secret values directly, creating exfiltration risk.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill is explicitly centered on Stripe (a payment gateway). It includes Stripe-specific commands and configuration (e.g., stripe CLI: stripe webhook_endpoints update <id> --url ..., setting STRIPE_WEBHOOK_SECRET env var, and code examples that set subscription_data.trial_end / checkout session behavior). Those are concrete, payment-gateway operations and configuration changes that directly affect payment processing and webhook handling. This meets the criterion for direct financial execution authority.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 10:37 AM