voice-clone

Fail

Audited by Snyk on Mar 8, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt embeds a hard-coded API key literal (WAVESPEED_KEY = "...") and constructs Authorization headers with it, which requires the LLM to handle and could output the secret verbatim.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). The file includes a hardcoded, high-entropy API key assigned as a default value:
  • WAVESPEED_KEY = os.getenv("WAVESPEED_KEY", "b9c67f3def268385bb9734970b11531f12ea24ae0d153859242e48ae46227668")

This is a long, random-looking literal used directly in an Authorization: Bearer header, which qualifies as an actual/API secret and should be treated as exposed credentials.

Ignored items: voice IDs (e.g., "wuna-001"), sample texts, file paths (including ".openclaw"), and other simple strings are low-entropy/documentation values and not flagged per the provided rules.

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 8, 2026, 02:25 AM