coolify
Fail
Audited by Snyk on Mar 24, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The skill's examples and CLI commands explicitly show embedding API tokens, database passwords, private keys, and environment variable values directly (e.g., --value "postgres://...", --private-key "$(cat ~/.ssh/id_rsa)", export COOLIFY_TOKEN="your-token-here", config "apiKey": "your-token-here"), which would require the LLM to output secret values verbatim when populating commands or configs.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill explicitly instructs the agent to call the Coolify API (app.coolify.io or a self‑hosted COOLIFY_API_URL) to fetch user-generated data such as application logs, deployment details, and repository/branch info—which SKILL.md and README.md show the agent will read and act on (e.g., "applications logs", "deploy", "applications get")—so untrusted third‑party content can influence subsequent actions.
Issues (2)
W007
HIGHInsecure credential handling detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
Audit Metadata