bitwarden

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly instructs using bw to fetch passwords, notes, and API keys (and even echoing BW_SESSION=$(bw unlock --raw) into .env), which requires reading and outputting secret values verbatim, so the LLM would handle/expose secrets directly.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content explicitly instructs how to locate and extract API keys, passwords, and session tokens from a Bitwarden vault (including persisting BW_SESSION), which facilitates credential theft and potential data exfiltration.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 12:25 AM