NYC

minio

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: HIGH
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill directly enables listing, downloading, and accessing objects (mc ls, mc cp, mc share, curl with pre-signed URLs) from S3 endpoints including the public MinIO Play sandbox (play.min.io), which can contain arbitrary/untrusted user-generated content the agent would read.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned for literal, high-entropy values. The documentation includes two explicit credential values under "For testing, use MinIO Play (public sandbox)":
  • MINIO_ACCESS_KEY="Q3AM3UQ867SPQQA43P2F"
  • MINIO_SECRET_KEY="zuf+tfteSlswRu7BJ86wekitnifILbZam1KYY3TG"

These are not placeholders (they are full, random-looking strings) and meet the entropy requirement for real credentials. Although they are published as MinIO Play (a public sandbox), they are actual, usable access and secret keys and therefore count as hardcoded secrets in the text. I did not flag other simple/example values or environment variable names because those are placeholders or low-entropy examples.

Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 08:57 PM