seo-audit

Fail

Audited by Snyk on Feb 27, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt embeds a sensitive header value (x-sop-internal: renDt/...AyZw=) and instructs automated requests to include it, which requires the LLM to handle and potentially output the secret verbatim (e.g., in curl/requests), creating an exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The SKILL.md audit workflow explicitly requires fetching and inspecting the target site's public pages (robots.txt, XML sitemap, page HTML and rendered JS/JSON-LD) and references using browser rendering, web_fetch/curl, Google Rich Results Test and Screaming Frog, so the agent will ingest and act on untrusted public website content supplied by users.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned the entire skill prompt for literal, high-entropy values that look like real credentials. The header value in the "WAF note" — x-sop-internal: renDt/H8fb0SN+zsgVWb9dqbd9SS5+UfGgCEIKbAyZw= — is a high-entropy string (base64-like, trailing "=") and is presented as a required header for automated requests to *.scienceofpeople.com. That matches the definition of a secret (a literal token giving access).

No other high-entropy literals were found. Other items in the document are either environment variable names, commands, human-readable configuration, or obvious examples/placeholders (which per the rules are ignored).

Audit Metadata
Risk Level
HIGH
Analyzed
Feb 27, 2026, 05:42 PM