codealive-context-engine

Fail

Audited by Snyk on May 12, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly tells the user they can paste their API key in chat and shows a command (python setup.py --key THE_KEY) that embeds the key verbatim, which requires the LLM/user-visible output to contain the secret.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's CLI and SKILL.md explicitly instruct the agent to call the CodeAlive API (e.g., scripts/search.py, scripts/fetch.py and scripts/lib/api_client.py -> fetch_artifacts / semantic_search) to retrieve code and descriptions from indexed repositories — including public libraries used in examples like "lodash" and "axios" — and mandates the agent read and act on that fetched third‑party content as ground truth, which clearly exposes it to untrusted, user-generated web content that could carry indirect prompt injections.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
HIGH
Analyzed
May 12, 2026, 02:30 PM
Issues
2