architecture

Fail

Audited by Snyk on Mar 29, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E004: Prompt injection detected in skill instructions.

  • Potential prompt injection detected (high risk: 0.90). The prompt explicitly instructs the agent to retrieve and write a GitHub auth token into ~/.git-credentials (via gh auth token ... embedded in a URL), which directs access/exposure of sensitive credentials and is unrelated to the core content-generation steps of building the architecture map.

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly instructs writing a GitHub auth token into a plaintext credentials file and using a push command that embeds the token in a remote URL (echo "https://GGPrompts:$(gh auth token --user GGPrompts)@github.com"), which forces handling/exposure of a secret value in shell commands and stored files.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content contains explicit, high-risk instructions to retrieve and persist a GitHub auth token in plaintext and use it to push changes (enabling credential theft and supply‑chain compromise), plus automated agent behaviors and remote script/CDN dependencies that could be abused to exfiltrate data or inject malicious payloads.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). Phase 1 (Research) explicitly instructs two sonnet subagents to use WebSearch and WebFetch "for documentation pages, GitHub READMEs, and architecture docs" — i.e., open/public, user-generated web content that the agents must read and use to drive their mapping decisions, which could allow indirect prompt injection.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The prompt instructs the agent to read and write project files (create/append HTML under architecture/...), modify the user's home credentials file (~/.git-credentials) and run git push with an auth token—actions that change the machine state and can exfiltrate credentials, so it should be flagged.

Issues (6)

E004
CRITICAL

Prompt injection detected in skill instructions.

W007
HIGH

Insecure credential handling detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 29, 2026, 02:15 AM
Issues
6