send-media
Audited by Snyk on Apr 19, 2026
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt includes hardcoded credentials (API_ID and API_HASH) and example commands/scripts that embed them directly, which requires the LLM to reproduce secret values verbatim if it outputs those snippets.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 0.90). High-risk: the skill hard-codes Telegram API credentials and a default remote chat ID and provides non-interactive usage patterns that allow arbitrary local files to be uploaded from the host to an external Telegram destination (facilitates data exfiltration/backdoor behavior).
HIGH W008: Secret detected in skill content (API keys, tokens, passwords).
- Secret detected (high risk: 1.00). I found a high-entropy, literal API hash present in the code samples: the API_HASH value ("4b812166a74fbd4eaadf5c4c1c855926") is a 32-character hex string used with Telethon/TelegramClient and appears verbatim in both code blocks. This is not a placeholder (e.g., "YOUR_API_KEY" or "sk-xxxx") and matches the pattern and entropy of a real, usable credential.
I ignored non-sensitive items: the API_ID (18256514) and CHAT_ID (-5111414203) are numeric identifiers and not high-entropy secrets, and the session file path is a local path (not a secret itself). No other high-entropy literals were found.
Remediation: treat the exposed API_HASH as compromised — rotate it in the Telegram developer console, remove it from the repository, and replace with a configuration/environment variable (e.g., TELEGRAM_API_HASH) or a secure secret store.
Issues (3)
Insecure credential handling detected in skill instructions.
Malicious code pattern detected in skill scripts.
Secret detected in skill content (API keys, tokens, passwords).