telnyx-video-java

Fail

Audited by Snyk on Mar 13, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes a real-looking refresh token value embedded verbatim in example code (e.g., .refreshToken("eyJhbGciOiJIUz...")), which instructs the agent to place secrets directly into generated output and is therefore insecure.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). The documentation contains a full, high-entropy JSON Web Token (JWT) literal used as the refreshToken value in the "Refresh Client Token" example. This token is not a placeholder (it is not redacted or truncated and does not use a generic name like YOUR_API_KEY) and appears directly usable to access the service until its expiry. Per the provided secret definition and analysis protocol, this qualifies as an actual secret that should be flagged. Other values in the doc (UUIDs, example IDs, simple strings) are low-entropy/sample values and were ignored.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W008
HIGH

Secret detected in skill content (API keys, tokens, passwords).

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 13, 2026, 01:03 PM
Issues
2