salvo-flash

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned the full prompt for literal, usable credentials. The only direct, potentially sensitive value is the byte string passed to SessionHandler::builder:

b"secretabsecretabsecretabsecretabsecretabsecretabsecretabsecretab"

This is used as the session cookie secret key in sample code, so it is a hardcoded secret that would be usable to sign/encrypt session data. It is not a generic placeholder like "YOUR_API_KEY" nor a simple example password; despite the repeated "secretab" pattern, it is long and present as an actual key value in code.

All other strings are non-secrets (flash messages, route paths, dependency versions, "0.0.0.0:8080", example JSON/messages, etc.) and are ignored per the rules (they are example text, environment variable names, or low-entropy placeholders).

Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 11:58 PM