telnyx-video-java

Fail

Audited by Snyk on Mar 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes an explicit refresh token JWT literal in an example (.refreshToken("eyJhbGciOiJIUzUxMiI...")), which demonstrates and would encourage embedding secret values verbatim in generated code/requests, creating an exfiltration risk.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). The code includes a full, high-entropy JWT literal (starts with "eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCJ9..." and includes the signature) used as the refreshToken value in the "Refresh Client Token" example. This is not a placeholder, truncated, or a simple setup password — it appears as a complete, usable credential in the example and therefore meets the definition of a secret to flag.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W008
HIGH

Secret detected in skill content (API keys, tokens, passwords).

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 16, 2026, 10:35 AM
Issues
2