NYC

generate-swagger-docs

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly instructs passing the OpenAI API key as a command-line argument and embedding it in environment variables/config files (and shows examples like "sk-proj-your-api-key-here"), which requires the agent to accept and reproduce secret values verbatim in commands and saved config—an exfiltration risk.

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.90). The OpenAI URL is legitimate, but the raw.githubusercontent.com link is a direct shell script from an unrecognized third‑party repo (qodex-ai/apimesh) — a pattern flagged as high risk because it tells you to download/execute an unknown .sh with your API key, which could exfiltrate secrets or run malicious commands.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). This skill downloads and executes the apimesh run.sh script from a public GitHub URL (https://raw.githubusercontent.com/qodex-ai/apimesh/refs/heads/main/run.sh), thereby ingesting and running untrusted third-party user-authored content as part of its workflow—which could enable indirect prompt injection.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 15, 2026, 08:45 PM