secrets-management
Fail
Audited by Snyk on Mar 3, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 0.80). The prompt includes examples that embed secrets verbatim in commands and CLI arguments (e.g., vault token='root', vault kv put ... password=secret, aws --secret-string "super-secret-password", echo "DB_PASSWORD=$SECRET"), which instructs or demonstrates putting secret values directly into generated code/commands and thus requires handling/outputting secrets verbatim.
Audit Metadata