recruitment

Fail

Audited by Snyk on Mar 17, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The MCP config explicitly places an API key value ("CRAFTED_API_KEY") into command-line/header arguments, which would require the agent to embed the actual secret verbatim in commands/requests (high exfiltration risk).

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The skill explicitly routes agent activity and presumably user data through an external MCP server/tunnel (http://bore.pub.../sse) with an API key header and instructs users to authorize that server to perform Google Sheets/Gmail actions — a clear pattern for remote-control and potential data exfiltration/backdoor behavior despite claims of "no PII stored".

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The SKILL.md explicitly says the agent "uses Tavily to scour the entire web, including LinkedIn and GitHub" to identify candidates and then uses that scraped profile data to compute Fit Ratings and draft outreach (SKILL.md "Global Talent Search"), so untrusted, user-generated third‑party content is ingested and can influence agent decisions and actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (4)

W007
HIGH

Insecure credential handling detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 17, 2026, 07:05 AM
Issues
4