NYC

airflow

Fail

Audited by Snyk on Feb 17, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The prompt includes hard-coded credentials and examples that embed passwords and connection URIs verbatim (e.g., --password admin, POSTGRES_PASSWORD, and connection strings with user:password), which are insecure patterns that would cause an LLM to output secret values directly.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill fetches and ingests external, potentially untrusted content at runtime (e.g., gitSync repo https://github.com/org/airflow-dags.git, pip constraint URL on raw.githubusercontent.com, the curl of airflow.apache.org/docker-compose.yaml, and HttpHook/HttpSensor responses that are parsed via response.json()), and those artifacts/DAGs/responses are read and acted on by Airflow, which could allow indirect instruction injection.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The Helm values.yaml enables gitSync with repo https://github.com/org/airflow-dags.git, which at runtime will clone remote Python DAGs into Airflow and thereby fetch and execute remote code in the agent environment.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 09:48 AM