NYC

Databases

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt embeds hardcoded connection strings with plaintext usernames and passwords (e.g., PWD=1NT3rn@t10n@l; Pwd=CrmP0ller) and shows them in example code/commands, which would require the LLM to reproduce secret values verbatim—creating an exfiltration risk.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned the full skill prompt for literal, usable credentials (high-entropy or specific passwords embedded in connection strings). I flagged values only where a password is directly present and looks like a specific credential (not a placeholder or trivial setup password).

Flagged findings:

  • PWD=1NT3rn@t10n@l (appears in the X3 MS SQL Server and Sage1000 connection strings: "DSN=OCS1;UID=sa;PWD=1NT3rn@t10n@l;") — this is a literal password in a connection string (sa account). It's not a placeholder and is likely usable.
  • Pwd=CrmP0ller (appears in the MySQL native connection string: "Server=rocs-production-es.ramsden-international.com;Port=6033;Database=keycloak;Uid=crm;Pwd=CrmP0ller;") — a literal password present in a production-looking connection string.

Ignored items and why:

  • Hostnames, DSNs, usernames (e.g., Host=rivsprod01, Username=jordan, DSN=DuckDB) — these are configuration values, not secrets.
  • JSON config example where "password": null — no secret present.
  • Paths, repo URLs, and tool locations (Y:..., gogs@...) — not secrets.
  • Other example values that are clearly placeholders or documentation (no literal API keys, PEM blocks, or redacted/truncated secrets found).

Recommendation: treat the two embedded passwords above as exposed credentials — rotate them and remove hardcoded credentials from documentation/configs (use environment variables or secret stores).

Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 03:17 AM