aqua-voice-malleability

Fail

Audited by Snyk on Feb 19, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The prompt includes an explicit telemetry API key and describes/exemplifies token extraction and injection (e.g., passing a Bearer token into WebSocket headers and flows that "extract token" and "inject with token"), which encourages reading and embedding secrets verbatim in commands or requests.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content contains explicit, actionable instructions for IPC injection (Electron DevTools/CDP), token extraction and reuse, direct WebSocket connections for sending audio/transcripts, and coordinated flows for intercepting and exfiltrating data—behaviors that enable credential theft, remote code execution and data exfiltration.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The SKILL.md explicitly instructs connecting to and reading from a public WebSocket endpoint (wss://aqua-realtime.fly.dev) and REST endpoints (https://aqua-server.fly.dev), including receiving transcripts via ws.recv() and monitoring the stream, which means the agent will ingest untrusted, user-generated third-party content as part of its workflow and that content could influence actions.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I looked for high-entropy, literal values that could provide access to a service and ignored obvious placeholders, simple setup passwords, truncated/redacted strings, and mere environment variable names.

Findings:

  • The PostHog entry "phc_N50q2qpNMS9QjJe1gBOQekcPH0wO8x6ZerI95Xi6meO" is a high-entropy literal token (prefixed with "phc_") and appears to be an actual telemetry/project API key. This meets the definition of a secret and should be treated as sensitive.
  • The Sentry entry "o1143996.ingest.us.sentry.io" is just a hostname/ingest endpoint (no DSN or public key included) and is not a secret — ignore.
  • Other values (endpoints like *.fly.dev, localhost URLs, parameter named token, example code snippets, simple strings) are either domain names, placeholders, or non-sensitive and were ignored per the rules.

Therefore a real high-entropy credential is present (the PostHog token).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt explicitly describes and instructs IPC injection, enabling remote debugging/DevTools CDP attacks, token extraction, and WebSocket injection to bypass app controls and manipulate a local application's runtime state, which constitutes actively compromising the machine/application security.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 19, 2026, 09:41 PM