Newt Blueprint Generator
Fail
Audited by Snyk on Feb 15, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt includes explicit secret-looking values (NEWT_SECRET, passwords, pincodes) and instructs generating configs that embed auth/env values, which requires the LLM to output secrets verbatim — an exfiltration risk.
HIGH W008: Secret detected in skill content (API keys, tokens, passwords).
- Secret detected (high risk: 1.00). I scanned the full prompt for literal, high-entropy credentials. The Docker Compose example includes:
- NEWT_ID=h1rbsgku89wf9z3
- NEWT_SECRET=z7g54mbcwkglpx1aau9gb8mzcccoof2fdbs97keoakg2pp5z
NEWT_SECRET is a long, random-looking string (high entropy) and appears to be an actual secret; NEWT_ID is a similarly random identifier often paired with a secret. These are direct, usable credentials in the example and should be treated as secrets.
Ignored items (not flagged):
- pincode: 123456 — low-entropy numeric example (allowed per policy).
- password: your-secure-password — obvious placeholder/example.
- basic-auth user: asdfa and password: sadf — simple/example values (low entropy).
- DOCKER_SOCKET, endpoints, and other descriptive values — non-secret configuration or environment names.
Therefore I mark this document as containing a real secret (the NEWT_SECRET and associated NEWT_ID).
Audit Metadata