coolify

Fail

Audited by Snyk on Mar 24, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill's examples and CLI commands explicitly show embedding API tokens, database passwords, private keys, and environment variable values directly (e.g., --value "postgres://...", --private-key "$(cat ~/.ssh/id_rsa)", export COOLIFY_TOKEN="your-token-here", config "apiKey": "your-token-here"), which would require the LLM to output secret values verbatim when populating commands or configs.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly instructs the agent to call the Coolify API (app.coolify.io or a self‑hosted COOLIFY_API_URL) to fetch user-generated data such as application logs, deployment details, and repository/branch info—which SKILL.md and README.md show the agent will read and act on (e.g., "applications logs", "deploy", "applications get")—so untrusted third‑party content can influence subsequent actions.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 24, 2026, 12:26 AM
Issues
2