NYC

supabase-extract-db-string

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly instructs saving discovered connection strings (and even says "full value in context file"), forcing the agent to capture and output raw DB passwords/connection strings into context/evidence files, which is direct secret handling/exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). This skill explicitly fetches and scans arbitrary public web targets (e.g., "Check for database connection strings on https://myapp.example.com") and inspects client-side bundles like /static/js/api.chunk.js, meaning it ingests untrusted third-party content that could carry indirect prompt-injection.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 08:27 PM