browser-to-api

Fail

Audited by Snyk on May 14, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The skill generates curl-ready examples and request/response samples (and records observed auth headers) from captured traffic and only performs best-effort redaction, so it can require emitting API keys/cookies/bearer tokens verbatim unless explicitly redacted.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly reads arbitrary browser-trace captures (cdp/network/{requests,responses}.jsonl and optional browse-network bodies under /cdp/network/bodies/) via load.mjs, parses request/response bodies in infer.mjs, and then uses those untrusted third‑party bodies to infer schemas and generate OpenAPI, client.mjs, and report.md in emit.mjs — meaning external webpage content directly influences tool behavior and produced code.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
HIGH
Analyzed
May 14, 2026, 10:45 PM
Issues
2