telnyx-voice-conferencing-python

Fail

Audited by Snyk on Mar 27, 2026

Risk Level: HIGH
Full Analysis

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned the prompt for high-entropy, literal values that could provide access.

Findings:

  • The string "v3:MdI91X4lWFEs7IgbBEOT9M4AigoY08M0WWZFISt1Yw2axZ_IiE4pqg" (appears multiple times as a call_control_id / connection id) is a long, random-looking value with a "v3:" prefix. It meets the high-entropy criteria and is used as an identifier that could be reused in API calls — therefore it's treated as a potential real credential and flagged.

Ignored items (and reasons):

  • UUIDs like "550e8400-e29b-41d4-a716-446655440000" and "182bd5e5-6e1a-4fe4-a799-aa6d9a6ab26e" — these are predictable/standard UUID examples (low-entropy resource IDs), so not flagged.
  • Simple/example values such as phone numbers, queue names ("support", "tier_1_support"), digits ("1234#"), and the environment variable reference TELNYX_API_KEY — these are documentation examples or placeholders and explicitly excluded by the rules.
  • No API secret like "sk-live-..." or private key blocks are present.

Conclusion: one high-entropy literal (the v3:... value) appears and is treated as a potential secret.

Issues (1)

W008
HIGH

Secret detected in skill content (API keys, tokens, passwords).

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 27, 2026, 01:02 AM
Issues
1