claude-team

Fail

Audited by Snyk on Mar 4, 2026

Risk Level: HIGH
Full Analysis

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned for high-entropy, literal credentials. The documentation contains one high-entropy string in the Environment Setup section:
  • export TELEGRAM_BOT_TOKEN="123456789:ABCdefGHIjklMNOpqrsTUVwxyz"

This matches the Telegram bot token pattern (numeric ID + long secret) and is a real-looking secret value, so it should be flagged.

I am ignoring the following as non-secrets per the rules:

  • TELEGRAM_CHAT_ID values (e.g., "-1001234567890") — a chat ID, not a secret.
  • The crontab example TELEGRAM_BOT_TOKEN="your-bot-token" — a documentation placeholder.
  • Short hex session_ids (e.g., "3962c5c4", "a1b2c3d4") — low-entropy internal IDs, not credentials.
  • Other examples, ports, URLs, and environment variable names — not secrets.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill instructs the agent to run setup scripts that install a persistent launchd service, modify crontab and user config files, create persistent files under the home directory, and even encourages a "skip_permissions" mode that bypasses permission checks — all of which modify the machine's state and bypass security safeguards.
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 4, 2026, 02:22 AM