postmark-webhooks
Fail
Audited by Snyk on Mar 1, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 0.90). The prompt explicitly shows and recommends embedding credentials and tokens in webhook URLs (e.g., https://username:password@... and ?token=your-secret-token) which encourages including secret values verbatim in generated URLs/commands, creating an exfiltration risk.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.70). The skill defines a public POST endpoint (/webhooks/postmark) in SKILL.md and multiple examples (examples/express/src/index.js, examples/fastapi/main.py, examples/nextjs/app/webhooks/postmark/route.ts) that ingest Postmark webhook payloads — including Inbound events with HtmlBody/TextBody and Click events with OriginalLink — and explicitly show processing that can trigger downstream actions (e.g., "Process incoming email", "Trigger re-engagement workflow"), so untrusted/user-generated third-party content is read and can materially influence behavior.
Audit Metadata