runpodctl

Fail

Audited by Snyk on Mar 4, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes example commands that embed secrets directly on the command line (e.g., --password "p") and references API key setup, which would require the agent to place secret values verbatim into generated commands — an exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). Yes — the skill's template commands (e.g., "runpodctl template list --type community" and "runpodctl template get " which "includes README, env, ports") pull community/user templates and READMEs from Runpod's public registry, untrusted user-generated content the agent would read and that could materially influence pod creation and subsequent actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 4, 2026, 09:08 PM