salvo-flash
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: HIGH
Full Analysis
HIGH W008: Secret detected in skill content (API keys, tokens, passwords).
- Secret detected (high risk: 1.00). I scanned the full prompt for literal, usable credentials. The only direct, potentially sensitive value is the byte string passed to SessionHandler::builder:
b"secretabsecretabsecretabsecretabsecretabsecretabsecretabsecretab"
This is used as the session cookie secret key in sample code, so it is a hardcoded secret that would be usable to sign/encrypt session data. It is not a generic placeholder like "YOUR_API_KEY" nor a simple example password; despite the repeated "secretab" pattern, it is long and present as an actual key value in code.
All other strings are non-secrets (flash messages, route paths, dependency versions, "0.0.0.0:8080", example JSON/messages, etc.) and are ignored per the rules (they are example text, environment variable names, or low-entropy placeholders).
Audit Metadata