telnyx-voice-conferencing-python
Fail
Audited by Snyk on Mar 27, 2026
Risk Level: HIGH
Full Analysis
HIGH W008: Secret detected in skill content (API keys, tokens, passwords).
- Secret detected (high risk: 1.00). I scanned the prompt for high-entropy, literal values that could provide access.
Findings:
- The string "v3:MdI91X4lWFEs7IgbBEOT9M4AigoY08M0WWZFISt1Yw2axZ_IiE4pqg" (appears multiple times as a call_control_id / connection id) is a long, random-looking value with a "v3:" prefix. It meets the high-entropy criteria and is used as an identifier that could be reused in API calls — therefore it's treated as a potential real credential and flagged.
Ignored items (and reasons):
- UUIDs like "550e8400-e29b-41d4-a716-446655440000" and "182bd5e5-6e1a-4fe4-a799-aa6d9a6ab26e" — these are predictable/standard UUID examples (low-entropy resource IDs), so not flagged.
- Simple/example values such as phone numbers, queue names ("support", "tier_1_support"), digits ("1234#"), and the environment variable reference TELNYX_API_KEY — these are documentation examples or placeholders and explicitly excluded by the rules.
- No API secret like "sk-live-..." or private key blocks are present.
Conclusion: one high-entropy literal (the v3:... value) appears and is treated as a potential secret.
Issues (1)
W008
HIGHSecret detected in skill content (API keys, tokens, passwords).
Audit Metadata